Analysis
-
max time kernel
162s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
13-02-2022 12:21
Static task
static1
Behavioral task
behavioral1
Sample
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe
Resource
win10v2004-en-20220113
General
-
Target
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe
-
Size
72KB
-
MD5
fb6f23927a2170bba9af65ca88d7664a
-
SHA1
37612c59c31dca457e54f5ebba1c4939f6505d63
-
SHA256
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5
-
SHA512
3df1c1ade15acf27426221ea9459e1b4913f4cd3ead29c0b0c59618a3dbf03a92ecd764b990cf7c6f98b5aa93f9651ea77725e37b28144ef4945ed22d8012b48
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!satana!.txt
Signatures
-
Satana
Ransomware family which also encrypts the system's Master Boot Record (MBR).
-
Executes dropped EXE 1 IoCs
Processes:
kgtlx.exepid process 3568 kgtlx.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dqcykzb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
kgtlx.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 kgtlx.exe -
Drops file in Windows directory 8 IoCs
Processes:
TiWorker.exesvchost.exedescription ioc process File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
kgtlx.exesvchost.exeTiWorker.exedescription pid process Token: SeIncBasePriorityPrivilege 3568 kgtlx.exe Token: SeShutdownPrivilege 1828 svchost.exe Token: SeCreatePagefilePrivilege 1828 svchost.exe Token: SeShutdownPrivilege 1828 svchost.exe Token: SeCreatePagefilePrivilege 1828 svchost.exe Token: SeShutdownPrivilege 1828 svchost.exe Token: SeCreatePagefilePrivilege 1828 svchost.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe Token: SeBackupPrivilege 1048 TiWorker.exe Token: SeRestorePrivilege 1048 TiWorker.exe Token: SeSecurityPrivilege 1048 TiWorker.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exedescription pid process target process PID 2648 wrote to memory of 3568 2648 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe kgtlx.exe PID 2648 wrote to memory of 3568 2648 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe kgtlx.exe PID 2648 wrote to memory of 3568 2648 7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe kgtlx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe"C:\Users\Admin\AppData\Local\Temp\7a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\kgtlx.exe"C:\Users\Admin\AppData\Local\Temp\kgtlx.exe" {ea90e9d2-74a7-11ec-b993-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\7A2E49~1.EXE"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
06de9aca43105f7508e297980406ed69
SHA116f1d0db36120e70d42c8ca06c5101ce7fdd6ff4
SHA256ad8944aed57da808a6ddbe86a9b631c0c345a5d08d527a54260d420b28bf3d48
SHA5124c1ebb781e59ce8ea07c75d8e69ecdd0ecaee799b22d43434854c36140ba6963dcb08a9febad3fb7ea29bad656eafd4800ba1908337bc620e2b0e0c74d212780
-
MD5
fb6f23927a2170bba9af65ca88d7664a
SHA137612c59c31dca457e54f5ebba1c4939f6505d63
SHA2567a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5
SHA5123df1c1ade15acf27426221ea9459e1b4913f4cd3ead29c0b0c59618a3dbf03a92ecd764b990cf7c6f98b5aa93f9651ea77725e37b28144ef4945ed22d8012b48
-
MD5
fb6f23927a2170bba9af65ca88d7664a
SHA137612c59c31dca457e54f5ebba1c4939f6505d63
SHA2567a2e499274f7d6140dd2679fc8cea05afb434f6721f952a9ff87293938a936b5
SHA5123df1c1ade15acf27426221ea9459e1b4913f4cd3ead29c0b0c59618a3dbf03a92ecd764b990cf7c6f98b5aa93f9651ea77725e37b28144ef4945ed22d8012b48