Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-02-2022 12:22
Static task
static1
Behavioral task
behavioral1
Sample
1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe
Resource
win10v2004-en-20220112
General
-
Target
1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe
-
Size
61KB
-
MD5
573b0cca8c051da66ea3b952b8cead10
-
SHA1
df64d3fb9788a4b36e0647c7c050dec51942d122
-
SHA256
1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28
-
SHA512
fce69862671fd31adc80426c996040a5db02c831c18f10233704270375c37e6e21896a103916fbda6d337a3614612dc9c444957764d07eecc750fcf184d0283a
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!satana!.txt
Signatures
-
Satana
Ransomware family which also encrypts the system's Master Boot Record (MBR).
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\zhwa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exepid process 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exepid process 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exedescription pid process Token: SeDebugPrivilege 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exedescription pid process target process PID 1596 wrote to memory of 368 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe wininit.exe PID 1596 wrote to memory of 368 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe wininit.exe PID 1596 wrote to memory of 368 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe wininit.exe PID 1596 wrote to memory of 368 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe wininit.exe PID 1596 wrote to memory of 368 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe wininit.exe PID 1596 wrote to memory of 368 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe wininit.exe PID 1596 wrote to memory of 368 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe wininit.exe PID 1596 wrote to memory of 384 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe csrss.exe PID 1596 wrote to memory of 384 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe csrss.exe PID 1596 wrote to memory of 384 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe csrss.exe PID 1596 wrote to memory of 384 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe csrss.exe PID 1596 wrote to memory of 384 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe csrss.exe PID 1596 wrote to memory of 384 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe csrss.exe PID 1596 wrote to memory of 384 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe csrss.exe PID 1596 wrote to memory of 420 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe winlogon.exe PID 1596 wrote to memory of 420 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe winlogon.exe PID 1596 wrote to memory of 420 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe winlogon.exe PID 1596 wrote to memory of 420 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe winlogon.exe PID 1596 wrote to memory of 420 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe winlogon.exe PID 1596 wrote to memory of 420 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe winlogon.exe PID 1596 wrote to memory of 420 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe winlogon.exe PID 1596 wrote to memory of 464 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe services.exe PID 1596 wrote to memory of 464 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe services.exe PID 1596 wrote to memory of 464 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe services.exe PID 1596 wrote to memory of 464 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe services.exe PID 1596 wrote to memory of 464 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe services.exe PID 1596 wrote to memory of 464 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe services.exe PID 1596 wrote to memory of 464 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe services.exe PID 1596 wrote to memory of 480 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsass.exe PID 1596 wrote to memory of 480 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsass.exe PID 1596 wrote to memory of 480 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsass.exe PID 1596 wrote to memory of 480 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsass.exe PID 1596 wrote to memory of 480 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsass.exe PID 1596 wrote to memory of 480 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsass.exe PID 1596 wrote to memory of 480 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsass.exe PID 1596 wrote to memory of 488 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsm.exe PID 1596 wrote to memory of 488 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsm.exe PID 1596 wrote to memory of 488 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsm.exe PID 1596 wrote to memory of 488 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsm.exe PID 1596 wrote to memory of 488 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsm.exe PID 1596 wrote to memory of 488 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsm.exe PID 1596 wrote to memory of 488 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe lsm.exe PID 1596 wrote to memory of 580 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 580 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 580 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 580 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 580 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 580 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 580 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 660 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 660 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 660 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 660 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 660 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 660 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 660 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 748 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 748 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 748 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 748 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 748 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 748 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 748 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe PID 1596 wrote to memory of 796 1596 1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe svchost.exe
Processes
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:660
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2036
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:2020
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1116
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1056
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:388
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:868
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:832
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:796
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:748
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:580
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:480
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:488
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe"C:\Users\Admin\AppData\Local\Temp\1523827831f7a0fec23a3bca905447c90402b5eef6b85e50f0abd1d7ee663f28.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184