Analysis
-
max time kernel
188s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:46
Static task
static1
Behavioral task
behavioral1
Sample
86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe
Resource
win10v2004-20221111-en
General
-
Target
86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe
-
Size
320KB
-
MD5
139aded90404e7566d4ece8ba1ba43aa
-
SHA1
95e5454aa03d07d3ff8d6de4fe743d8b6bd41508
-
SHA256
86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee
-
SHA512
30ef9e4de12713bdb808229edfba05e0561a2126bb7df8d1917ea9c868ced8bd462284a460dbe6405971725b8eff9b8cad2833ebc384cbfbc604ddac259a6bc0
-
SSDEEP
6144:R7NyWYhRghGq/998Ox2qf9QbmsrQIvKLnLjH9JXE9v2xkJwJuP8D:R7NyWYhRghGq/998Ox99emsrcLZ9u2xP
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exedescription ioc process File opened (read-only) \??\X: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\Y: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\Z: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\A: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\B: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\N: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\S: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\T: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\M: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\G: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\H: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\J: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\K: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\L: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\F: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\O: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\P: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\V: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\W: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\E: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\I: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\Q: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\R: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe File opened (read-only) \??\U: 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exedescription pid process target process PID 1572 set thread context of 2772 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exepid process 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exedescription pid process Token: SeShutdownPrivilege 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe Token: SeCreatePagefilePrivilege 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exepid process 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exedescription pid process target process PID 1572 wrote to memory of 2772 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe PID 1572 wrote to memory of 2772 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe PID 1572 wrote to memory of 2772 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe PID 1572 wrote to memory of 2772 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe PID 1572 wrote to memory of 2772 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe PID 1572 wrote to memory of 2772 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe PID 1572 wrote to memory of 2772 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe PID 1572 wrote to memory of 2772 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe PID 1572 wrote to memory of 2772 1572 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe 86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe"C:\Users\Admin\AppData\Local\Temp\86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exeC:\Users\Admin\AppData\Local\Temp\86c5df9499a895636348644f1342182f0ae92a90f78308877ee1d1c5cd7acfee.exe2⤵PID:2772