Analysis
-
max time kernel
151s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-02-2022 12:20
Static task
static1
Behavioral task
behavioral1
Sample
ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe
Resource
win10v2004-en-20220112
General
-
Target
ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe
-
Size
34KB
-
MD5
a5444dd6ee8773915096c31bd882e247
-
SHA1
88265756945984ebd5fe58827c39ca1f1a2bf487
-
SHA256
ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72
-
SHA512
1d535287436a2b30895860ca5e06784bc6d1a3c35f513e890d44ce3a84bbdead3ff39882929cce1e5a62a186999e639bd8473da2384f1c8f5326c993a3fc2247
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!satana!.txt
Signatures
-
Satana
Ransomware family which also encrypts the system's Master Boot Record (MBR).
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
wyrmi.exepid process 524 wyrmi.exe -
Deletes itself 1 IoCs
Processes:
wyrmi.exepid process 524 wyrmi.exe -
Loads dropped DLL 5 IoCs
Processes:
ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exewyrmi.exepid process 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe 524 wyrmi.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\ucaa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
wyrmi.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 wyrmi.exe -
Drops file in Program Files directory 64 IoCs
Processes:
wyrmi.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-application-views.xml wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\36.png wyrmi.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt wyrmi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml wyrmi.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\feature.xml wyrmi.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\!satana!.txt wyrmi.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\!satana!.txt wyrmi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\StopIconMask.bmp wyrmi.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-progress-ui.xml wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\month.png wyrmi.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\info.png wyrmi.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\InfoPath.en-us\!satana!.txt wyrmi.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogoBeta.png wyrmi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Monet.jpg wyrmi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Tanspecks.jpg wyrmi.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\button-bullet.png wyrmi.exe File created C:\Program Files\VideoLAN\VLC\locale\he\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_65_ffffff_1x400.png wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_blue_snow.png wyrmi.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt wyrmi.exe File created C:\Program Files\Windows Defender\!satana!.txt wyrmi.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\!satana!.txt wyrmi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Pushpin.xml wyrmi.exe File created C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-profiling.xml wyrmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png wyrmi.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt wyrmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\15x15dot.png wyrmi.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\!satana!.txt wyrmi.exe File created C:\Program Files\Java\jdk1.7.0_80\include\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-text.xml wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-sa.xml wyrmi.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\!satana!.txt wyrmi.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\15x15dot.png wyrmi.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-uisupport.xml wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_double_orange.png wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\gadget.xml wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_partly-cloudy.png wyrmi.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOffNotificationInAcrobat.gif wyrmi.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\trash.gif wyrmi.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-application-views.xml wyrmi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Psychedelic.jpg wyrmi.exe File created C:\Program Files\Windows Journal\en-US\!satana!.txt wyrmi.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\!satana!.txt wyrmi.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\2.png wyrmi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Executive.xml wyrmi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\CalendarToolIconImagesMask.bmp wyrmi.exe File created C:\Program Files\Microsoft Games\Hearts\de-DE\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationRight_SelectionSubpicture.png wyrmi.exe File created C:\Program Files\Java\jre7\!satana!.txt wyrmi.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\drag.png wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\gadget.xml wyrmi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
VSSADMIN.EXEpid process 920 VSSADMIN.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
wyrmi.exevssvc.exedescription pid process Token: SeIncBasePriorityPrivilege 524 wyrmi.exe Token: SeBackupPrivilege 744 vssvc.exe Token: SeRestorePrivilege 744 vssvc.exe Token: SeAuditPrivilege 744 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exewyrmi.exedescription pid process target process PID 528 wrote to memory of 524 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe wyrmi.exe PID 528 wrote to memory of 524 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe wyrmi.exe PID 528 wrote to memory of 524 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe wyrmi.exe PID 528 wrote to memory of 524 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe wyrmi.exe PID 524 wrote to memory of 920 524 wyrmi.exe VSSADMIN.EXE PID 524 wrote to memory of 920 524 wyrmi.exe VSSADMIN.EXE PID 524 wrote to memory of 920 524 wyrmi.exe VSSADMIN.EXE PID 524 wrote to memory of 920 524 wyrmi.exe VSSADMIN.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe"C:\Users\Admin\AppData\Local\Temp\ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\wyrmi.exe"C:\Users\Admin\AppData\Local\Temp\wyrmi.exe" {846ee340-7039-11de-9d20-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\EA2C16~1.EXE"2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\VSSADMIN.EXE"C:\Windows\system32\VSSADMIN.EXE" Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:920
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d2606d6c2e0f1f53ab9e734727c9fe12
SHA1323141ea25c08a6d8b0042d9928c9493f16334f5
SHA2561ff1a93f0514de46a2692b4ce0482d9345e3a2cf4d947e87f49c6310c5b34fb0
SHA512613064942993f3cfaf5530d82f8e0f54675d4757471bb76a6e77e4886befb0035bcdc245606732dee1de04aa2fac1cc0f4fc6ca7c5c36085eca6d493153f49b0
-
MD5
a5444dd6ee8773915096c31bd882e247
SHA188265756945984ebd5fe58827c39ca1f1a2bf487
SHA256ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72
SHA5121d535287436a2b30895860ca5e06784bc6d1a3c35f513e890d44ce3a84bbdead3ff39882929cce1e5a62a186999e639bd8473da2384f1c8f5326c993a3fc2247
-
MD5
a5444dd6ee8773915096c31bd882e247
SHA188265756945984ebd5fe58827c39ca1f1a2bf487
SHA256ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72
SHA5121d535287436a2b30895860ca5e06784bc6d1a3c35f513e890d44ce3a84bbdead3ff39882929cce1e5a62a186999e639bd8473da2384f1c8f5326c993a3fc2247
-
MD5
a5444dd6ee8773915096c31bd882e247
SHA188265756945984ebd5fe58827c39ca1f1a2bf487
SHA256ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72
SHA5121d535287436a2b30895860ca5e06784bc6d1a3c35f513e890d44ce3a84bbdead3ff39882929cce1e5a62a186999e639bd8473da2384f1c8f5326c993a3fc2247
-
MD5
a5444dd6ee8773915096c31bd882e247
SHA188265756945984ebd5fe58827c39ca1f1a2bf487
SHA256ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72
SHA5121d535287436a2b30895860ca5e06784bc6d1a3c35f513e890d44ce3a84bbdead3ff39882929cce1e5a62a186999e639bd8473da2384f1c8f5326c993a3fc2247
-
MD5
a5444dd6ee8773915096c31bd882e247
SHA188265756945984ebd5fe58827c39ca1f1a2bf487
SHA256ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72
SHA5121d535287436a2b30895860ca5e06784bc6d1a3c35f513e890d44ce3a84bbdead3ff39882929cce1e5a62a186999e639bd8473da2384f1c8f5326c993a3fc2247
-
MD5
a5444dd6ee8773915096c31bd882e247
SHA188265756945984ebd5fe58827c39ca1f1a2bf487
SHA256ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72
SHA5121d535287436a2b30895860ca5e06784bc6d1a3c35f513e890d44ce3a84bbdead3ff39882929cce1e5a62a186999e639bd8473da2384f1c8f5326c993a3fc2247
-
MD5
a5444dd6ee8773915096c31bd882e247
SHA188265756945984ebd5fe58827c39ca1f1a2bf487
SHA256ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72
SHA5121d535287436a2b30895860ca5e06784bc6d1a3c35f513e890d44ce3a84bbdead3ff39882929cce1e5a62a186999e639bd8473da2384f1c8f5326c993a3fc2247