Analysis
-
max time kernel
151s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-02-2022 12:20
Static task
static1
Behavioral task
behavioral1
Sample
ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe
Resource
win10v2004-en-20220112
General
-
Target
ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe
-
Size
34KB
-
MD5
a5444dd6ee8773915096c31bd882e247
-
SHA1
88265756945984ebd5fe58827c39ca1f1a2bf487
-
SHA256
ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72
-
SHA512
1d535287436a2b30895860ca5e06784bc6d1a3c35f513e890d44ce3a84bbdead3ff39882929cce1e5a62a186999e639bd8473da2384f1c8f5326c993a3fc2247
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!satana!.txt
Signatures
-
Satana
Ransomware family which also encrypts the system's Master Boot Record (MBR).
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 524 wyrmi.exe -
Deletes itself 1 IoCs
pid Process 524 wyrmi.exe -
Loads dropped DLL 5 IoCs
pid Process 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe 524 wyrmi.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\ucaa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 wyrmi.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-application-views.xml wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\36.png wyrmi.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt wyrmi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml wyrmi.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\feature.xml wyrmi.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\!satana!.txt wyrmi.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\!satana!.txt wyrmi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\StopIconMask.bmp wyrmi.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-progress-ui.xml wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\month.png wyrmi.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\info.png wyrmi.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\InfoPath.en-us\!satana!.txt wyrmi.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogoBeta.png wyrmi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Monet.jpg wyrmi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Tanspecks.jpg wyrmi.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\button-bullet.png wyrmi.exe File created C:\Program Files\VideoLAN\VLC\locale\he\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_65_ffffff_1x400.png wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_blue_snow.png wyrmi.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt wyrmi.exe File created C:\Program Files\Windows Defender\!satana!.txt wyrmi.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\!satana!.txt wyrmi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Pushpin.xml wyrmi.exe File created C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-profiling.xml wyrmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png wyrmi.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt wyrmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\15x15dot.png wyrmi.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\!satana!.txt wyrmi.exe File created C:\Program Files\Java\jdk1.7.0_80\include\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-text.xml wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-sa.xml wyrmi.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\!satana!.txt wyrmi.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\15x15dot.png wyrmi.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-uisupport.xml wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_double_orange.png wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\gadget.xml wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_partly-cloudy.png wyrmi.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOffNotificationInAcrobat.gif wyrmi.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\trash.gif wyrmi.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-application-views.xml wyrmi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Psychedelic.jpg wyrmi.exe File created C:\Program Files\Windows Journal\en-US\!satana!.txt wyrmi.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\!satana!.txt wyrmi.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\2.png wyrmi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Executive.xml wyrmi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\CalendarToolIconImagesMask.bmp wyrmi.exe File created C:\Program Files\Microsoft Games\Hearts\de-DE\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationRight_SelectionSubpicture.png wyrmi.exe File created C:\Program Files\Java\jre7\!satana!.txt wyrmi.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\!satana!.txt wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\drag.png wyrmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\gadget.xml wyrmi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 920 VSSADMIN.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 524 wyrmi.exe Token: SeBackupPrivilege 744 vssvc.exe Token: SeRestorePrivilege 744 vssvc.exe Token: SeAuditPrivilege 744 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 528 wrote to memory of 524 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe 27 PID 528 wrote to memory of 524 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe 27 PID 528 wrote to memory of 524 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe 27 PID 528 wrote to memory of 524 528 ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe 27 PID 524 wrote to memory of 920 524 wyrmi.exe 28 PID 524 wrote to memory of 920 524 wyrmi.exe 28 PID 524 wrote to memory of 920 524 wyrmi.exe 28 PID 524 wrote to memory of 920 524 wyrmi.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe"C:\Users\Admin\AppData\Local\Temp\ea2c169529e782994be5296c81ff4668dba2b77a805bd057b53e5952c65aaf72.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\wyrmi.exe"C:\Users\Admin\AppData\Local\Temp\wyrmi.exe" {846ee340-7039-11de-9d20-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\EA2C16~1.EXE"2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\VSSADMIN.EXE"C:\Windows\system32\VSSADMIN.EXE" Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:920
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:744