Analysis
-
max time kernel
156s -
max time network
131s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-02-2022 12:21
Static task
static1
Behavioral task
behavioral1
Sample
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe
Resource
win10v2004-en-20220113
General
-
Target
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe
-
Size
72KB
-
MD5
fb6f23927a2170bba9af65ca88d7664a
-
SHA1
37612c59c31dca457e54f5ebba1c4939f6505d63
-
SHA256
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5
-
SHA512
3df1c1ade15acf27426221ea9459e1b4913f4cd3ead29c0b0c59618a3dbf03a92ecd764b990cf7c6f98b5aa93f9651ea77725e37b28144ef4945ed22d8012b48
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!satana!.txt
Signatures
-
Satana
Ransomware family which also encrypts the system's Master Boot Record (MBR).
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
vmxx.exepid process 776 vmxx.exe -
Deletes itself 1 IoCs
Processes:
vmxx.exepid process 776 vmxx.exe -
Loads dropped DLL 5 IoCs
Processes:
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exevmxx.exepid process 1180 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe 1180 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe 1180 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe 1180 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe 776 vmxx.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzqyg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
vmxx.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 vmxx.exe -
Drops file in Program Files directory 64 IoCs
Processes:
vmxx.exedescription ioc process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\hint_up.png vmxx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-new.png vmxx.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\!satana!.txt vmxx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\11.png vmxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-text.xml vmxx.exe File created C:\Program Files\Windows Defender\!satana!.txt vmxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsrus.xml vmxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationUp_SelectionSubpicture.png vmxx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\triangle.png vmxx.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\!satana!.txt vmxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\userContent_16x9_imagemask.png vmxx.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\!satana!.txt vmxx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Equity.xml vmxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-jvm.xml vmxx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color32.jpg vmxx.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\!satana!.txt vmxx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bPrev-down.png vmxx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\daisies.png vmxx.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\de-DE\!satana!.txt vmxx.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt vmxx.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\Logo.png vmxx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_s.png vmxx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\5.png vmxx.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\!satana!.txt vmxx.exe File created C:\Program Files (x86)\Google\Temp\!satana!.txt vmxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\mix.gif vmxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-queries.xml vmxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\play-background.png vmxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\THIRDPARTYLICENSEREADME.txt vmxx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\!satana!.txt vmxx.exe File created C:\Program Files\Mozilla Firefox\!satana!.txt vmxx.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\playlist_jstree.xml vmxx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\novelty_settings.png vmxx.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt vmxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ja-jp.xml vmxx.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\!satana!.txt vmxx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Grid.xml vmxx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\graph_over.png vmxx.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\!satana!.txt vmxx.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\!satana!.txt vmxx.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\!satana!.txt vmxx.exe File created C:\Program Files\Java\jre7\lib\jfr\!satana!.txt vmxx.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\!satana!.txt vmxx.exe File opened for modification C:\Program Files\VideoLAN\VLC\THANKS.txt vmxx.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Filters\!satana!.txt vmxx.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\!satana!.txt vmxx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\!satana!.txt vmxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-filesystems.xml vmxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-autoupdate-services.xml vmxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-coredump.xml vmxx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\16-on-black.gif vmxx.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\!satana!.txt vmxx.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\!satana!.txt vmxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-execution.xml vmxx.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\!satana!.txt vmxx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_pressed.png vmxx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Black Tie.xml vmxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-queries.xml vmxx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\!satana!.txt vmxx.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\!satana!.txt vmxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationRight_SelectionSubpicture.png vmxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_specialocc_Thumbnail.bmp vmxx.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\!satana!.txt vmxx.exe File opened for modification C:\Program Files (x86)\Common Files\Services\verisign.bmp vmxx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
VSSADMIN.EXEpid process 1368 VSSADMIN.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
vmxx.exevssvc.exedescription pid process Token: SeIncBasePriorityPrivilege 776 vmxx.exe Token: SeBackupPrivilege 1752 vssvc.exe Token: SeRestorePrivilege 1752 vssvc.exe Token: SeAuditPrivilege 1752 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exevmxx.exedescription pid process target process PID 1180 wrote to memory of 776 1180 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe vmxx.exe PID 1180 wrote to memory of 776 1180 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe vmxx.exe PID 1180 wrote to memory of 776 1180 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe vmxx.exe PID 1180 wrote to memory of 776 1180 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe vmxx.exe PID 776 wrote to memory of 1368 776 vmxx.exe VSSADMIN.EXE PID 776 wrote to memory of 1368 776 vmxx.exe VSSADMIN.EXE PID 776 wrote to memory of 1368 776 vmxx.exe VSSADMIN.EXE PID 776 wrote to memory of 1368 776 vmxx.exe VSSADMIN.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe"C:\Users\Admin\AppData\Local\Temp\7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\vmxx.exe"C:\Users\Admin\AppData\Local\Temp\vmxx.exe" {846ee340-7039-11de-9d20-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\7A2E49~1.EXE"2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\VSSADMIN.EXE"C:\Windows\system32\VSSADMIN.EXE" Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1368
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
cbdfae2e2620b9e56d869e484fcfdac3
SHA1719c2e760f4453c323ac06635844823b966fbbb3
SHA25661139bf5ee5be48f83bef4d9e9ff3a31355e48b2c890ce8fd2b3ec63a51f7018
SHA5123a3bcf4d137cbc549a48ac08648c672ee0d780f4e57cbf6348a5c11dc9c84823fcb134646306c66aac007bb56577e223e2681701f55c779858f7ee633e9e0a4d
-
MD5
fb6f23927a2170bba9af65ca88d7664a
SHA137612c59c31dca457e54f5ebba1c4939f6505d63
SHA2567a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5
SHA5123df1c1ade15acf27426221ea9459e1b4913f4cd3ead29c0b0c59618a3dbf03a92ecd764b990cf7c6f98b5aa93f9651ea77725e37b28144ef4945ed22d8012b48
-
MD5
fb6f23927a2170bba9af65ca88d7664a
SHA137612c59c31dca457e54f5ebba1c4939f6505d63
SHA2567a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5
SHA5123df1c1ade15acf27426221ea9459e1b4913f4cd3ead29c0b0c59618a3dbf03a92ecd764b990cf7c6f98b5aa93f9651ea77725e37b28144ef4945ed22d8012b48
-
MD5
fb6f23927a2170bba9af65ca88d7664a
SHA137612c59c31dca457e54f5ebba1c4939f6505d63
SHA2567a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5
SHA5123df1c1ade15acf27426221ea9459e1b4913f4cd3ead29c0b0c59618a3dbf03a92ecd764b990cf7c6f98b5aa93f9651ea77725e37b28144ef4945ed22d8012b48
-
MD5
fb6f23927a2170bba9af65ca88d7664a
SHA137612c59c31dca457e54f5ebba1c4939f6505d63
SHA2567a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5
SHA5123df1c1ade15acf27426221ea9459e1b4913f4cd3ead29c0b0c59618a3dbf03a92ecd764b990cf7c6f98b5aa93f9651ea77725e37b28144ef4945ed22d8012b48
-
MD5
fb6f23927a2170bba9af65ca88d7664a
SHA137612c59c31dca457e54f5ebba1c4939f6505d63
SHA2567a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5
SHA5123df1c1ade15acf27426221ea9459e1b4913f4cd3ead29c0b0c59618a3dbf03a92ecd764b990cf7c6f98b5aa93f9651ea77725e37b28144ef4945ed22d8012b48
-
MD5
fb6f23927a2170bba9af65ca88d7664a
SHA137612c59c31dca457e54f5ebba1c4939f6505d63
SHA2567a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5
SHA5123df1c1ade15acf27426221ea9459e1b4913f4cd3ead29c0b0c59618a3dbf03a92ecd764b990cf7c6f98b5aa93f9651ea77725e37b28144ef4945ed22d8012b48
-
MD5
fb6f23927a2170bba9af65ca88d7664a
SHA137612c59c31dca457e54f5ebba1c4939f6505d63
SHA2567a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5
SHA5123df1c1ade15acf27426221ea9459e1b4913f4cd3ead29c0b0c59618a3dbf03a92ecd764b990cf7c6f98b5aa93f9651ea77725e37b28144ef4945ed22d8012b48