Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-02-2022 03:12
Static task
static1
Behavioral task
behavioral1
Sample
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
Resource
win10v2004-en-20220113
General
-
Target
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
-
Size
235KB
-
MD5
247951ff7b519fa8d39ef07d33e0ba5b
-
SHA1
cf4587b6015d2a00c26a369339504595a266401f
-
SHA256
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03
-
SHA512
6185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7
Malware Config
Signatures
-
SaintBot Payload 4 IoCs
resource yara_rule behavioral1/memory/1620-57-0x0000000000220000-0x0000000000229000-memory.dmp family_saintbot behavioral1/memory/1620-59-0x0000000000400000-0x000000000040B000-memory.dmp family_saintbot behavioral1/memory/648-66-0x00000000001B0000-0x00000000001B9000-memory.dmp family_saintbot behavioral1/memory/452-72-0x0000000000080000-0x000000000008B000-memory.dmp family_saintbot -
Executes dropped EXE 1 IoCs
pid Process 648 45013.exe -
Deletes itself 1 IoCs
pid Process 1276 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\45013.exe ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\45013.exe 45013.exe -
Loads dropped DLL 4 IoCs
pid Process 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 648 45013.exe 452 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 45013.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 45013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 EhStorAuthn.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 872 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1072 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 648 45013.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1620 wrote to memory of 648 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 27 PID 1620 wrote to memory of 648 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 27 PID 1620 wrote to memory of 648 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 27 PID 1620 wrote to memory of 648 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 27 PID 1620 wrote to memory of 1276 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 28 PID 1620 wrote to memory of 1276 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 28 PID 1620 wrote to memory of 1276 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 28 PID 1620 wrote to memory of 1276 1620 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 28 PID 1276 wrote to memory of 1072 1276 cmd.exe 30 PID 1276 wrote to memory of 1072 1276 cmd.exe 30 PID 1276 wrote to memory of 1072 1276 cmd.exe 30 PID 1276 wrote to memory of 1072 1276 cmd.exe 30 PID 1276 wrote to memory of 892 1276 cmd.exe 31 PID 1276 wrote to memory of 892 1276 cmd.exe 31 PID 1276 wrote to memory of 892 1276 cmd.exe 31 PID 1276 wrote to memory of 892 1276 cmd.exe 31 PID 648 wrote to memory of 452 648 45013.exe 32 PID 648 wrote to memory of 452 648 45013.exe 32 PID 648 wrote to memory of 452 648 45013.exe 32 PID 648 wrote to memory of 452 648 45013.exe 32 PID 648 wrote to memory of 452 648 45013.exe 32 PID 452 wrote to memory of 872 452 EhStorAuthn.exe 33 PID 452 wrote to memory of 872 452 EhStorAuthn.exe 33 PID 452 wrote to memory of 872 452 EhStorAuthn.exe 33 PID 452 wrote to memory of 872 452 EhStorAuthn.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe"C:\Users\Admin\AppData\Local\Temp\ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\45013.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\45013.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:872
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:1072
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:892
-
-