Analysis
-
max time kernel
91s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 13:12
Static task
static1
Behavioral task
behavioral1
Sample
86f83b70d1aa64929c8b89bed5c84f3f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
86f83b70d1aa64929c8b89bed5c84f3f.exe
Resource
win10v2004-20231222-en
General
-
Target
86f83b70d1aa64929c8b89bed5c84f3f.exe
-
Size
14KB
-
MD5
86f83b70d1aa64929c8b89bed5c84f3f
-
SHA1
afd398b63b3fe2191adf9721aececd9c2728b029
-
SHA256
0979c50283bc2ac3b15100d23526b100f6742937479a3b70d7a455a94937652a
-
SHA512
a0bb4c9c6ea1e7bef4d30556bacc56cfdf7073a5aa9de557edff0e87150e28f73472adb71b35696af261ba74e64580ff26daebaccae90d6fbeea9937ba4ab19d
-
SSDEEP
384:0WkoWNVbZb7OC/zK2vDW935y3f32Wdev4U0L4iCs/Thp:y/FIaO2M3ov2WdLJbf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 86f83b70d1aa64929c8b89bed5c84f3f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1088 2116 WerFault.exe 83 4412 2116 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe Token: SeSystemtimePrivilege 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2116 wrote to memory of 4876 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 85 PID 2116 wrote to memory of 4876 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 85 PID 2116 wrote to memory of 4876 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 85 PID 2116 wrote to memory of 4856 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 88 PID 2116 wrote to memory of 4856 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 88 PID 2116 wrote to memory of 4856 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 88 PID 2116 wrote to memory of 3024 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 91 PID 2116 wrote to memory of 3024 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 91 PID 2116 wrote to memory of 3024 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 91 PID 2116 wrote to memory of 4068 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 93 PID 2116 wrote to memory of 4068 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 93 PID 2116 wrote to memory of 4068 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 93 PID 2116 wrote to memory of 3540 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 95 PID 2116 wrote to memory of 3540 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 95 PID 2116 wrote to memory of 3540 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 95 PID 2116 wrote to memory of 3640 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 97 PID 2116 wrote to memory of 3640 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 97 PID 2116 wrote to memory of 3640 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 97 PID 2116 wrote to memory of 2908 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 100 PID 2116 wrote to memory of 2908 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 100 PID 2116 wrote to memory of 2908 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 100 PID 2116 wrote to memory of 3856 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 102 PID 2116 wrote to memory of 3856 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 102 PID 2116 wrote to memory of 3856 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 102 PID 2116 wrote to memory of 1692 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 104 PID 2116 wrote to memory of 1692 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 104 PID 2116 wrote to memory of 1692 2116 86f83b70d1aa64929c8b89bed5c84f3f.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\86f83b70d1aa64929c8b89bed5c84f3f.exe"C:\Users\Admin\AppData\Local\Temp\86f83b70d1aa64929c8b89bed5c84f3f.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\packet.dll /e /p everyone:f2⤵PID:4876
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\pthreadVC.dll /e /p everyone:f2⤵PID:4856
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\wpcap.dll /e /p everyone:f2⤵PID:3024
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\drivers\npf.sys /e /p everyone:f2⤵PID:4068
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\npptools.dll /e /p everyone:f2⤵PID:3540
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\drivers\acpidisk.sys /e /p everyone:f2⤵PID:3640
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\wanpacket.dll /e /p everyone:f2⤵PID:2908
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\Documents and Settings\All Users\¡¸¿ªÊ¼¡¹²Ëµ¥\³ÌÐò\Æô¶¯ /e /p everyone:f2⤵PID:3856
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\drivers\etc\hosts /e /p everyone:f2⤵PID:1692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 6642⤵
- Program crash
PID:1088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 6962⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2116 -ip 21161⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2116 -ip 21161⤵PID:2856