Analysis
-
max time kernel
130s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
28-02-2022 03:12
Static task
static1
Behavioral task
behavioral1
Sample
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
Resource
win10v2004-en-20220113
General
-
Target
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
-
Size
235KB
-
MD5
247951ff7b519fa8d39ef07d33e0ba5b
-
SHA1
cf4587b6015d2a00c26a369339504595a266401f
-
SHA256
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03
-
SHA512
6185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7
Malware Config
Signatures
-
SaintBot Payload 4 IoCs
resource yara_rule behavioral2/memory/1996-132-0x0000000000B60000-0x0000000000B69000-memory.dmp family_saintbot behavioral2/memory/1996-133-0x0000000000400000-0x000000000040B000-memory.dmp family_saintbot behavioral2/memory/2756-139-0x0000000000400000-0x000000000040B000-memory.dmp family_saintbot behavioral2/memory/1724-142-0x0000000001290000-0x000000000129B000-memory.dmp family_saintbot -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 4996 created 1996 4996 WerFault.exe 78 PID 2008 created 2756 2008 WerFault.exe 79 -
Executes dropped EXE 1 IoCs
pid Process 2756 42850.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\42850.exe 42850.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\42850.exe ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe -
Loads dropped DLL 2 IoCs
pid Process 2756 42850.exe 1724 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 42850.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 42850.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3944 1996 WerFault.exe 78 1156 2756 WerFault.exe 79 -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2088 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5060 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3944 WerFault.exe 3944 WerFault.exe 2756 42850.exe 2756 42850.exe 1156 WerFault.exe 1156 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 3944 WerFault.exe Token: SeBackupPrivilege 3944 WerFault.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2756 1996 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 79 PID 1996 wrote to memory of 2756 1996 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 79 PID 1996 wrote to memory of 2756 1996 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 79 PID 1996 wrote to memory of 3776 1996 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 82 PID 1996 wrote to memory of 3776 1996 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 82 PID 1996 wrote to memory of 3776 1996 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 82 PID 3776 wrote to memory of 5060 3776 cmd.exe 83 PID 3776 wrote to memory of 5060 3776 cmd.exe 83 PID 3776 wrote to memory of 5060 3776 cmd.exe 83 PID 4996 wrote to memory of 1996 4996 WerFault.exe 78 PID 4996 wrote to memory of 1996 4996 WerFault.exe 78 PID 3776 wrote to memory of 4692 3776 cmd.exe 86 PID 3776 wrote to memory of 4692 3776 cmd.exe 86 PID 3776 wrote to memory of 4692 3776 cmd.exe 86 PID 2756 wrote to memory of 1724 2756 42850.exe 87 PID 2756 wrote to memory of 1724 2756 42850.exe 87 PID 2756 wrote to memory of 1724 2756 42850.exe 87 PID 2756 wrote to memory of 1724 2756 42850.exe 87 PID 2008 wrote to memory of 2756 2008 WerFault.exe 79 PID 2008 wrote to memory of 2756 2008 WerFault.exe 79 PID 1724 wrote to memory of 2088 1724 EhStorAuthn.exe 90 PID 1724 wrote to memory of 2088 1724 EhStorAuthn.exe 90 PID 1724 wrote to memory of 2088 1724 EhStorAuthn.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe"C:\Users\Admin\AppData\Local\Temp\ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe"1⤵
- Checks computer location settings
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\42850.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\42850.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:2088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 6323⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:5060
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:4692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 9082⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1996 -ip 19961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2756 -ip 27561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:2008