Analysis
-
max time kernel
130s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
28-02-2022 03:12
Static task
static1
Behavioral task
behavioral1
Sample
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
Resource
win10v2004-en-20220113
General
-
Target
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
-
Size
235KB
-
MD5
247951ff7b519fa8d39ef07d33e0ba5b
-
SHA1
cf4587b6015d2a00c26a369339504595a266401f
-
SHA256
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03
-
SHA512
6185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7
Malware Config
Signatures
-
SaintBot Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1996-132-0x0000000000B60000-0x0000000000B69000-memory.dmp family_saintbot behavioral2/memory/1996-133-0x0000000000400000-0x000000000040B000-memory.dmp family_saintbot behavioral2/memory/2756-139-0x0000000000400000-0x000000000040B000-memory.dmp family_saintbot behavioral2/memory/1724-142-0x0000000001290000-0x000000000129B000-memory.dmp family_saintbot -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 4996 created 1996 4996 WerFault.exe ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe PID 2008 created 2756 2008 WerFault.exe 42850.exe -
Executes dropped EXE 1 IoCs
Processes:
42850.exepid process 2756 42850.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe -
Drops startup file 2 IoCs
Processes:
42850.exeec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\42850.exe 42850.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\42850.exe ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe -
Loads dropped DLL 2 IoCs
Processes:
42850.exeEhStorAuthn.exepid process 2756 42850.exe 1724 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
EhStorAuthn.exeec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe42850.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 42850.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 42850.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe -
Drops file in System32 directory 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3944 1996 WerFault.exe ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 1156 2756 WerFault.exe 42850.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeEhStorAuthn.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
WerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
WerFault.exe42850.exeWerFault.exepid process 3944 WerFault.exe 3944 WerFault.exe 2756 42850.exe 2756 42850.exe 1156 WerFault.exe 1156 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3944 WerFault.exe Token: SeBackupPrivilege 3944 WerFault.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.execmd.exeWerFault.exe42850.exeWerFault.exeEhStorAuthn.exedescription pid process target process PID 1996 wrote to memory of 2756 1996 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 42850.exe PID 1996 wrote to memory of 2756 1996 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 42850.exe PID 1996 wrote to memory of 2756 1996 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 42850.exe PID 1996 wrote to memory of 3776 1996 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe cmd.exe PID 1996 wrote to memory of 3776 1996 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe cmd.exe PID 1996 wrote to memory of 3776 1996 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe cmd.exe PID 3776 wrote to memory of 5060 3776 cmd.exe PING.EXE PID 3776 wrote to memory of 5060 3776 cmd.exe PING.EXE PID 3776 wrote to memory of 5060 3776 cmd.exe PING.EXE PID 4996 wrote to memory of 1996 4996 WerFault.exe ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe PID 4996 wrote to memory of 1996 4996 WerFault.exe ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe PID 3776 wrote to memory of 4692 3776 cmd.exe cmd.exe PID 3776 wrote to memory of 4692 3776 cmd.exe cmd.exe PID 3776 wrote to memory of 4692 3776 cmd.exe cmd.exe PID 2756 wrote to memory of 1724 2756 42850.exe EhStorAuthn.exe PID 2756 wrote to memory of 1724 2756 42850.exe EhStorAuthn.exe PID 2756 wrote to memory of 1724 2756 42850.exe EhStorAuthn.exe PID 2756 wrote to memory of 1724 2756 42850.exe EhStorAuthn.exe PID 2008 wrote to memory of 2756 2008 WerFault.exe 42850.exe PID 2008 wrote to memory of 2756 2008 WerFault.exe 42850.exe PID 1724 wrote to memory of 2088 1724 EhStorAuthn.exe schtasks.exe PID 1724 wrote to memory of 2088 1724 EhStorAuthn.exe schtasks.exe PID 1724 wrote to memory of 2088 1724 EhStorAuthn.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe"C:\Users\Admin\AppData\Local\Temp\ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe"1⤵
- Checks computer location settings
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\42850.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\42850.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:2088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 6323⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:5060
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:4692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 9082⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1996 -ip 19961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2756 -ip 27561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:2008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
MD5
4f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
MD5
4f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
MD5
247951ff7b519fa8d39ef07d33e0ba5b
SHA1cf4587b6015d2a00c26a369339504595a266401f
SHA256ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03
SHA5126185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7
-
MD5
247951ff7b519fa8d39ef07d33e0ba5b
SHA1cf4587b6015d2a00c26a369339504595a266401f
SHA256ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03
SHA5126185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7
-
MD5
9b1143ff58ed5cb62d5217076eaf0964
SHA1f67b957fbfd107aeaed1f48733e13c3dc7d6b1af
SHA2565e2151e781bf9cf36e4fc6a6d13d4686fa6375edfbe7143b1a3a40e0a4415556
SHA5127f63336f33ea624a04984855b8d9e541a75c18dea067b92d153a79750c23716743e112f198dc65ba2ca1ddc5a7ad7bb5eb0076de54fbdba27862592b16cbc095