Analysis
-
max time kernel
158s -
max time network
144s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-02-2022 12:21
Static task
static1
Behavioral task
behavioral1
Sample
68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe
Resource
win10v2004-en-20220113
General
-
Target
68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe
-
Size
108KB
-
MD5
3891f28b03951612f08d1bfd59ca56ea
-
SHA1
fcb3fdec404bbf5c0ff087c8efb2c82da1e724a4
-
SHA256
68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed
-
SHA512
11cb504e9d15f8d8cd56fe31cf8d34d300bc68921769aa533bb5adfc8481fd203a8236fe259541158c05621dffce6d40e0a7429cae5dd7cd7fa8f3b888a4b219
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!satana!.txt
Signatures
-
Satana
Ransomware family which also encrypts the system's Master Boot Record (MBR).
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
jzpdut.exepid process 552 jzpdut.exe -
Deletes itself 1 IoCs
Processes:
jzpdut.exepid process 552 jzpdut.exe -
Loads dropped DLL 5 IoCs
Processes:
68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exejzpdut.exepid process 1780 68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe 1780 68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe 1780 68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe 1780 68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe 552 jzpdut.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\ffjjbwfi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" 68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
jzpdut.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 jzpdut.exe -
Drops file in Program Files directory 64 IoCs
Processes:
jzpdut.exedescription ioc process File created C:\Program Files\7-Zip\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers.xml jzpdut.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt jzpdut.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\chapters-static.png jzpdut.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationLeft_SelectionSubpicture.png jzpdut.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\feature.xml jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\button-highlight.png jzpdut.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationUp_SelectionSubpicture.png jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\blackbars80.png jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationLeft_ButtonGraphic.png jzpdut.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-filesystems.xml jzpdut.exe File created C:\Program Files\Microsoft Games\More Games\en-US\!satana!.txt jzpdut.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\!satana!.txt jzpdut.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationUp_ButtonGraphic.png jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationRight_SelectionSubpicture.png jzpdut.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\!satana!.txt jzpdut.exe File created C:\Program Files\Microsoft Games\FreeCell\es-ES\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\whitemenu.png jzpdut.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\!satana!.txt jzpdut.exe File created C:\Program Files\Microsoft Games\Chess\ja-JP\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt jzpdut.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-swing-plaf.xml jzpdut.exe File created C:\Program Files\Microsoft Games\Solitaire\en-US\!satana!.txt jzpdut.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationRight_ButtonGraphic.png jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SceneButtonSubpicture.png jzpdut.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\feature.xml jzpdut.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-api-annotations-common.xml jzpdut.exe File created C:\Program Files\Microsoft Games\Chess\de-DE\!satana!.txt jzpdut.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-background.png jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\TitleButtonIcon.png jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\scenesscroll.png jzpdut.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-heapdump.xml jzpdut.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-tools.xml jzpdut.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-io.xml jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationUp_ButtonGraphic.png jzpdut.exe File created C:\Program Files\Google\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-javahelp.xml jzpdut.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-attach.xml jzpdut.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt jzpdut.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\!satana!.txt jzpdut.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\!satana!.txt jzpdut.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-autoupdate-services.xml jzpdut.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\!satana!.txt jzpdut.exe File created C:\Program Files\Microsoft Office\Office14\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-sampler.xml jzpdut.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\!satana!.txt jzpdut.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\!satana!.txt jzpdut.exe File created C:\Program Files\Common Files\Microsoft Shared\VC\!satana!.txt jzpdut.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\videowall.png jzpdut.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\!satana!.txt jzpdut.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\!satana!.txt jzpdut.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
VSSADMIN.EXEpid process 972 VSSADMIN.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
jzpdut.exevssvc.exedescription pid process Token: SeIncBasePriorityPrivilege 552 jzpdut.exe Token: SeBackupPrivilege 1808 vssvc.exe Token: SeRestorePrivilege 1808 vssvc.exe Token: SeAuditPrivilege 1808 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exejzpdut.exedescription pid process target process PID 1780 wrote to memory of 552 1780 68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe jzpdut.exe PID 1780 wrote to memory of 552 1780 68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe jzpdut.exe PID 1780 wrote to memory of 552 1780 68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe jzpdut.exe PID 1780 wrote to memory of 552 1780 68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe jzpdut.exe PID 552 wrote to memory of 972 552 jzpdut.exe VSSADMIN.EXE PID 552 wrote to memory of 972 552 jzpdut.exe VSSADMIN.EXE PID 552 wrote to memory of 972 552 jzpdut.exe VSSADMIN.EXE PID 552 wrote to memory of 972 552 jzpdut.exe VSSADMIN.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe"C:\Users\Admin\AppData\Local\Temp\68ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\jzpdut.exe"C:\Users\Admin\AppData\Local\Temp\jzpdut.exe" {846ee340-7039-11de-9d20-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\68EE03~1.EXE"2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\VSSADMIN.EXE"C:\Windows\system32\VSSADMIN.EXE" Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:972
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
84814c1b044627e5866c8a16d4c87ab0
SHA1e8ad4246f6919a3959a2c3e15b2c2df4651b5fd2
SHA2560ba94494168446ee955afc1b5ebd9b21e63eb1340ec2807b851b4d8eb7e0e56a
SHA5122147f8f536a15f6c77d11d4e85605595bb754e73fcd2d66173d792fb450120c699fcb18557881e5996def92ea8cd515d83fad601b422cdbd026716e42cc08033
-
MD5
3891f28b03951612f08d1bfd59ca56ea
SHA1fcb3fdec404bbf5c0ff087c8efb2c82da1e724a4
SHA25668ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed
SHA51211cb504e9d15f8d8cd56fe31cf8d34d300bc68921769aa533bb5adfc8481fd203a8236fe259541158c05621dffce6d40e0a7429cae5dd7cd7fa8f3b888a4b219
-
MD5
3891f28b03951612f08d1bfd59ca56ea
SHA1fcb3fdec404bbf5c0ff087c8efb2c82da1e724a4
SHA25668ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed
SHA51211cb504e9d15f8d8cd56fe31cf8d34d300bc68921769aa533bb5adfc8481fd203a8236fe259541158c05621dffce6d40e0a7429cae5dd7cd7fa8f3b888a4b219
-
MD5
3891f28b03951612f08d1bfd59ca56ea
SHA1fcb3fdec404bbf5c0ff087c8efb2c82da1e724a4
SHA25668ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed
SHA51211cb504e9d15f8d8cd56fe31cf8d34d300bc68921769aa533bb5adfc8481fd203a8236fe259541158c05621dffce6d40e0a7429cae5dd7cd7fa8f3b888a4b219
-
MD5
3891f28b03951612f08d1bfd59ca56ea
SHA1fcb3fdec404bbf5c0ff087c8efb2c82da1e724a4
SHA25668ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed
SHA51211cb504e9d15f8d8cd56fe31cf8d34d300bc68921769aa533bb5adfc8481fd203a8236fe259541158c05621dffce6d40e0a7429cae5dd7cd7fa8f3b888a4b219
-
MD5
3891f28b03951612f08d1bfd59ca56ea
SHA1fcb3fdec404bbf5c0ff087c8efb2c82da1e724a4
SHA25668ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed
SHA51211cb504e9d15f8d8cd56fe31cf8d34d300bc68921769aa533bb5adfc8481fd203a8236fe259541158c05621dffce6d40e0a7429cae5dd7cd7fa8f3b888a4b219
-
MD5
3891f28b03951612f08d1bfd59ca56ea
SHA1fcb3fdec404bbf5c0ff087c8efb2c82da1e724a4
SHA25668ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed
SHA51211cb504e9d15f8d8cd56fe31cf8d34d300bc68921769aa533bb5adfc8481fd203a8236fe259541158c05621dffce6d40e0a7429cae5dd7cd7fa8f3b888a4b219
-
MD5
3891f28b03951612f08d1bfd59ca56ea
SHA1fcb3fdec404bbf5c0ff087c8efb2c82da1e724a4
SHA25668ee03ab15e22934ed61dab828c9fb4d504746d3798d2f95311628c3594e47ed
SHA51211cb504e9d15f8d8cd56fe31cf8d34d300bc68921769aa533bb5adfc8481fd203a8236fe259541158c05621dffce6d40e0a7429cae5dd7cd7fa8f3b888a4b219