Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-02-2022 03:12
Static task
static1
Behavioral task
behavioral1
Sample
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
Resource
win10v2004-en-20220113
General
-
Target
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
-
Size
235KB
-
MD5
247951ff7b519fa8d39ef07d33e0ba5b
-
SHA1
cf4587b6015d2a00c26a369339504595a266401f
-
SHA256
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03
-
SHA512
6185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7
Malware Config
Signatures
-
SaintBot Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1620-57-0x0000000000220000-0x0000000000229000-memory.dmp family_saintbot behavioral1/memory/1620-59-0x0000000000400000-0x000000000040B000-memory.dmp family_saintbot behavioral1/memory/648-66-0x00000000001B0000-0x00000000001B9000-memory.dmp family_saintbot behavioral1/memory/452-72-0x0000000000080000-0x000000000008B000-memory.dmp family_saintbot -
Executes dropped EXE 1 IoCs
Processes:
45013.exepid process 648 45013.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1276 cmd.exe -
Drops startup file 2 IoCs
Processes:
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe45013.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\45013.exe ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\45013.exe 45013.exe -
Loads dropped DLL 4 IoCs
Processes:
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe45013.exeEhStorAuthn.exepid process 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 648 45013.exe 452 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe45013.exeEhStorAuthn.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 45013.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 45013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 EhStorAuthn.exe -
Drops file in System32 directory 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EhStorAuthn.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
45013.exepid process 648 45013.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.execmd.exe45013.exeEhStorAuthn.exedescription pid process target process PID 1620 wrote to memory of 648 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 45013.exe PID 1620 wrote to memory of 648 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 45013.exe PID 1620 wrote to memory of 648 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 45013.exe PID 1620 wrote to memory of 648 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 45013.exe PID 1620 wrote to memory of 1276 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe cmd.exe PID 1620 wrote to memory of 1276 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe cmd.exe PID 1620 wrote to memory of 1276 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe cmd.exe PID 1620 wrote to memory of 1276 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe cmd.exe PID 1276 wrote to memory of 1072 1276 cmd.exe PING.EXE PID 1276 wrote to memory of 1072 1276 cmd.exe PING.EXE PID 1276 wrote to memory of 1072 1276 cmd.exe PING.EXE PID 1276 wrote to memory of 1072 1276 cmd.exe PING.EXE PID 1276 wrote to memory of 892 1276 cmd.exe cmd.exe PID 1276 wrote to memory of 892 1276 cmd.exe cmd.exe PID 1276 wrote to memory of 892 1276 cmd.exe cmd.exe PID 1276 wrote to memory of 892 1276 cmd.exe cmd.exe PID 648 wrote to memory of 452 648 45013.exe EhStorAuthn.exe PID 648 wrote to memory of 452 648 45013.exe EhStorAuthn.exe PID 648 wrote to memory of 452 648 45013.exe EhStorAuthn.exe PID 648 wrote to memory of 452 648 45013.exe EhStorAuthn.exe PID 648 wrote to memory of 452 648 45013.exe EhStorAuthn.exe PID 452 wrote to memory of 872 452 EhStorAuthn.exe schtasks.exe PID 452 wrote to memory of 872 452 EhStorAuthn.exe schtasks.exe PID 452 wrote to memory of 872 452 EhStorAuthn.exe schtasks.exe PID 452 wrote to memory of 872 452 EhStorAuthn.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe"C:\Users\Admin\AppData\Local\Temp\ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\45013.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\45013.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:872
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:1072
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:892
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
MD5
247951ff7b519fa8d39ef07d33e0ba5b
SHA1cf4587b6015d2a00c26a369339504595a266401f
SHA256ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03
SHA5126185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7
-
MD5
247951ff7b519fa8d39ef07d33e0ba5b
SHA1cf4587b6015d2a00c26a369339504595a266401f
SHA256ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03
SHA5126185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7
-
MD5
9b1143ff58ed5cb62d5217076eaf0964
SHA1f67b957fbfd107aeaed1f48733e13c3dc7d6b1af
SHA2565e2151e781bf9cf36e4fc6a6d13d4686fa6375edfbe7143b1a3a40e0a4415556
SHA5127f63336f33ea624a04984855b8d9e541a75c18dea067b92d153a79750c23716743e112f198dc65ba2ca1ddc5a7ad7bb5eb0076de54fbdba27862592b16cbc095
-
MD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
MD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
MD5
247951ff7b519fa8d39ef07d33e0ba5b
SHA1cf4587b6015d2a00c26a369339504595a266401f
SHA256ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03
SHA5126185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7
-
MD5
247951ff7b519fa8d39ef07d33e0ba5b
SHA1cf4587b6015d2a00c26a369339504595a266401f
SHA256ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03
SHA5126185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7