Analysis
-
max time kernel
152s -
max time network
127s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-02-2022 12:21
Static task
static1
Behavioral task
behavioral1
Sample
b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe
Resource
win10v2004-en-20220112
General
-
Target
b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe
-
Size
72KB
-
MD5
2c0d06420d5af53d3324717bc2e4f280
-
SHA1
f0d10df44ee7ae8e2da6c02eb1fb9ed1517c26fa
-
SHA256
b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7
-
SHA512
7e6c63d1bcba6e22a0f6a2539c25daf451c698fb2579747dd42b059e3780787582263b42ee57e1f8448764fb29b07173a5b8ec43c250fe2e725c6e44b1e3c583
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!satana!.txt
Signatures
-
Satana
Ransomware family which also encrypts the system's Master Boot Record (MBR).
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
tasbqbc.exepid process 1660 tasbqbc.exe -
Deletes itself 1 IoCs
Processes:
tasbqbc.exepid process 1660 tasbqbc.exe -
Loads dropped DLL 5 IoCs
Processes:
b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exetasbqbc.exepid process 1628 b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe 1628 b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe 1628 b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe 1628 b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe 1660 tasbqbc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\hubjl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
tasbqbc.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 tasbqbc.exe -
Drops file in Program Files directory 64 IoCs
Processes:
tasbqbc.exedescription ioc process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\1047x576black.png tasbqbc.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\!satana!.txt tasbqbc.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\!satana!.txt tasbqbc.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.png tasbqbc.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana\!satana!.txt tasbqbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\OutofSyncIconImages.jpg tasbqbc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\1047x576black.png tasbqbc.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\!satana!.txt tasbqbc.exe File created C:\Program Files\Common Files\System\msadc\en-US\!satana!.txt tasbqbc.exe File opened for modification C:\Program Files\Internet Explorer\Timeline.cpu.xml tasbqbc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-jmx.xml tasbqbc.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\!satana!.txt tasbqbc.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\!satana!.txt tasbqbc.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\!satana!.txt tasbqbc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.xml tasbqbc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\bookbig.gif tasbqbc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-nodes.xml tasbqbc.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\!satana!.txt tasbqbc.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\!satana!.txt tasbqbc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\blackbars80.png tasbqbc.exe File created C:\Program Files\Reference Assemblies\!satana!.txt tasbqbc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\tile16.png tasbqbc.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\!satana!.txt tasbqbc.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\!satana!.txt tasbqbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\NotifierBackgroundRTL.jpg tasbqbc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\MainMenuButtonIcon.png tasbqbc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_SelectionSubpicture.png tasbqbc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_MCELogo_mouseover.png tasbqbc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_SelectionSubpicture.png tasbqbc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_left_disabled.png tasbqbc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\gadget.xml tasbqbc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_search_down.png tasbqbc.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Sort\!satana!.txt tasbqbc.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\!satana!.txt tasbqbc.exe File created C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\!satana!.txt tasbqbc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\(120DPI)notConnectedStateIcon.png tasbqbc.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\!satana!.txt tasbqbc.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt tasbqbc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\item_hover_docked.png tasbqbc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\34.png tasbqbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\Response.gif tasbqbc.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt tasbqbc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-editor-mimelookup.xml tasbqbc.exe File created C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\!satana!.txt tasbqbc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Back-48.png tasbqbc.exe File created C:\Program Files\Windows NT\TableTextService\ja-JP\!satana!.txt tasbqbc.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\!satana!.txt tasbqbc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\gadget.xml tasbqbc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_ButtonGraphic.png tasbqbc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\btn-previous-static.png tasbqbc.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceArray.txt tasbqbc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bg-today.png tasbqbc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_corner_bottom_left.png tasbqbc.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\!satana!.txt tasbqbc.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt tasbqbc.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\!satana!.txt tasbqbc.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\!satana!.txt tasbqbc.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\!satana!.txt tasbqbc.exe File created C:\Program Files (x86)\Common Files\microsoft shared\DW\!satana!.txt tasbqbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\NotifierBackground.jpg tasbqbc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\highlight.png tasbqbc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-jvm.xml tasbqbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\background.gif tasbqbc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-snaptracer.xml tasbqbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
VSSADMIN.EXEpid process 1504 VSSADMIN.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
tasbqbc.exevssvc.exedescription pid process Token: SeIncBasePriorityPrivilege 1660 tasbqbc.exe Token: SeBackupPrivilege 2012 vssvc.exe Token: SeRestorePrivilege 2012 vssvc.exe Token: SeAuditPrivilege 2012 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exetasbqbc.exedescription pid process target process PID 1628 wrote to memory of 1660 1628 b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe tasbqbc.exe PID 1628 wrote to memory of 1660 1628 b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe tasbqbc.exe PID 1628 wrote to memory of 1660 1628 b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe tasbqbc.exe PID 1628 wrote to memory of 1660 1628 b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe tasbqbc.exe PID 1660 wrote to memory of 1504 1660 tasbqbc.exe VSSADMIN.EXE PID 1660 wrote to memory of 1504 1660 tasbqbc.exe VSSADMIN.EXE PID 1660 wrote to memory of 1504 1660 tasbqbc.exe VSSADMIN.EXE PID 1660 wrote to memory of 1504 1660 tasbqbc.exe VSSADMIN.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe"C:\Users\Admin\AppData\Local\Temp\b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\tasbqbc.exe"C:\Users\Admin\AppData\Local\Temp\tasbqbc.exe" {846ee340-7039-11de-9d20-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\B23FE1~1.EXE"2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\VSSADMIN.EXE"C:\Windows\system32\VSSADMIN.EXE" Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1504
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9c4bbcbddbb76e27f2a802b2781bc877
SHA1b6da6284c1e5c47c7f7e5510f314a142cbfe4dc4
SHA2563a9488c4673728924f52637cca68f200849478f9a210e9ef8a8fabeb0cdfa246
SHA512b96a05740b4c965c46047bc1d1725746c065cf46fe284fc33e24bf6d2cfceb15452788e45b18064b9ae01c993bdede5cbabd96191470001860c2713cf54b58e1
-
MD5
2c0d06420d5af53d3324717bc2e4f280
SHA1f0d10df44ee7ae8e2da6c02eb1fb9ed1517c26fa
SHA256b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7
SHA5127e6c63d1bcba6e22a0f6a2539c25daf451c698fb2579747dd42b059e3780787582263b42ee57e1f8448764fb29b07173a5b8ec43c250fe2e725c6e44b1e3c583
-
MD5
2c0d06420d5af53d3324717bc2e4f280
SHA1f0d10df44ee7ae8e2da6c02eb1fb9ed1517c26fa
SHA256b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7
SHA5127e6c63d1bcba6e22a0f6a2539c25daf451c698fb2579747dd42b059e3780787582263b42ee57e1f8448764fb29b07173a5b8ec43c250fe2e725c6e44b1e3c583
-
MD5
2c0d06420d5af53d3324717bc2e4f280
SHA1f0d10df44ee7ae8e2da6c02eb1fb9ed1517c26fa
SHA256b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7
SHA5127e6c63d1bcba6e22a0f6a2539c25daf451c698fb2579747dd42b059e3780787582263b42ee57e1f8448764fb29b07173a5b8ec43c250fe2e725c6e44b1e3c583
-
MD5
2c0d06420d5af53d3324717bc2e4f280
SHA1f0d10df44ee7ae8e2da6c02eb1fb9ed1517c26fa
SHA256b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7
SHA5127e6c63d1bcba6e22a0f6a2539c25daf451c698fb2579747dd42b059e3780787582263b42ee57e1f8448764fb29b07173a5b8ec43c250fe2e725c6e44b1e3c583
-
MD5
2c0d06420d5af53d3324717bc2e4f280
SHA1f0d10df44ee7ae8e2da6c02eb1fb9ed1517c26fa
SHA256b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7
SHA5127e6c63d1bcba6e22a0f6a2539c25daf451c698fb2579747dd42b059e3780787582263b42ee57e1f8448764fb29b07173a5b8ec43c250fe2e725c6e44b1e3c583
-
MD5
2c0d06420d5af53d3324717bc2e4f280
SHA1f0d10df44ee7ae8e2da6c02eb1fb9ed1517c26fa
SHA256b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7
SHA5127e6c63d1bcba6e22a0f6a2539c25daf451c698fb2579747dd42b059e3780787582263b42ee57e1f8448764fb29b07173a5b8ec43c250fe2e725c6e44b1e3c583
-
MD5
2c0d06420d5af53d3324717bc2e4f280
SHA1f0d10df44ee7ae8e2da6c02eb1fb9ed1517c26fa
SHA256b23fe1a321b8f7b9f0736574a98d115853c84ca6934752e4be13771eec4ac7b7
SHA5127e6c63d1bcba6e22a0f6a2539c25daf451c698fb2579747dd42b059e3780787582263b42ee57e1f8448764fb29b07173a5b8ec43c250fe2e725c6e44b1e3c583