Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-02-2022 03:13
Static task
static1
Behavioral task
behavioral1
Sample
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe
Resource
win10v2004-en-20220113
General
-
Target
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe
-
Size
269KB
-
MD5
e640bdb76d7b30cb9ca9250d5b6631e3
-
SHA1
0540792efa9eb7ecdcfce3340dc0be1204c1e8c8
-
SHA256
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42
-
SHA512
0d9bbc8f82a212cbb92595f2d5e7e4e1bab00061286f04441dce4c383827e3d55a60afee4e1d52b2af4ded201c5c54c046a4065ca055cfa1448b807a4a4a2034
Malware Config
Signatures
-
SaintBot Payload 3 IoCs
resource yara_rule behavioral1/memory/972-58-0x0000000000030000-0x0000000000039000-memory.dmp family_saintbot behavioral1/memory/972-59-0x0000000000400000-0x000000000040C000-memory.dmp family_saintbot behavioral1/memory/2016-71-0x0000000000080000-0x000000000008C000-memory.dmp family_saintbot -
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Executes dropped EXE 1 IoCs
pid Process 476 Microsoft Office Shared MUI (English) 2010.exe -
Deletes itself 1 IoCs
pid Process 772 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Shared MUI (English) 2010.exe Microsoft Office Shared MUI (English) 2010.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Shared MUI (English) 2010.exe b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe -
Loads dropped DLL 4 IoCs
pid Process 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 476 Microsoft Office Shared MUI (English) 2010.exe 2016 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum Microsoft Office Shared MUI (English) 2010.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Microsoft Office Shared MUI (English) 2010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1964 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1036 PING.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 972 wrote to memory of 476 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 27 PID 972 wrote to memory of 476 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 27 PID 972 wrote to memory of 476 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 27 PID 972 wrote to memory of 476 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 27 PID 972 wrote to memory of 772 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 28 PID 972 wrote to memory of 772 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 28 PID 972 wrote to memory of 772 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 28 PID 972 wrote to memory of 772 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 28 PID 772 wrote to memory of 1036 772 cmd.exe 30 PID 772 wrote to memory of 1036 772 cmd.exe 30 PID 772 wrote to memory of 1036 772 cmd.exe 30 PID 772 wrote to memory of 1036 772 cmd.exe 30 PID 772 wrote to memory of 1076 772 cmd.exe 31 PID 772 wrote to memory of 1076 772 cmd.exe 31 PID 772 wrote to memory of 1076 772 cmd.exe 31 PID 772 wrote to memory of 1076 772 cmd.exe 31 PID 476 wrote to memory of 2016 476 Microsoft Office Shared MUI (English) 2010.exe 32 PID 476 wrote to memory of 2016 476 Microsoft Office Shared MUI (English) 2010.exe 32 PID 476 wrote to memory of 2016 476 Microsoft Office Shared MUI (English) 2010.exe 32 PID 476 wrote to memory of 2016 476 Microsoft Office Shared MUI (English) 2010.exe 32 PID 476 wrote to memory of 2016 476 Microsoft Office Shared MUI (English) 2010.exe 32 PID 2016 wrote to memory of 1964 2016 EhStorAuthn.exe 33 PID 2016 wrote to memory of 1964 2016 EhStorAuthn.exe 33 PID 2016 wrote to memory of 1964 2016 EhStorAuthn.exe 33 PID 2016 wrote to memory of 1964 2016 EhStorAuthn.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe"C:\Users\Admin\AppData\Local\Temp\b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Shared MUI (English) 2010.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Shared MUI (English) 2010.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:1964
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:1036
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:1076
-
-