Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-02-2022 03:13
Static task
static1
Behavioral task
behavioral1
Sample
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe
Resource
win10v2004-en-20220113
General
-
Target
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe
-
Size
269KB
-
MD5
e640bdb76d7b30cb9ca9250d5b6631e3
-
SHA1
0540792efa9eb7ecdcfce3340dc0be1204c1e8c8
-
SHA256
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42
-
SHA512
0d9bbc8f82a212cbb92595f2d5e7e4e1bab00061286f04441dce4c383827e3d55a60afee4e1d52b2af4ded201c5c54c046a4065ca055cfa1448b807a4a4a2034
Malware Config
Signatures
-
SaintBot Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/972-58-0x0000000000030000-0x0000000000039000-memory.dmp family_saintbot behavioral1/memory/972-59-0x0000000000400000-0x000000000040C000-memory.dmp family_saintbot behavioral1/memory/2016-71-0x0000000000080000-0x000000000008C000-memory.dmp family_saintbot -
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Executes dropped EXE 1 IoCs
Processes:
Microsoft Office Shared MUI (English) 2010.exepid process 476 Microsoft Office Shared MUI (English) 2010.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 772 cmd.exe -
Drops startup file 2 IoCs
Processes:
Microsoft Office Shared MUI (English) 2010.exeb1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Shared MUI (English) 2010.exe Microsoft Office Shared MUI (English) 2010.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Shared MUI (English) 2010.exe b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe -
Loads dropped DLL 4 IoCs
Processes:
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exeMicrosoft Office Shared MUI (English) 2010.exeEhStorAuthn.exepid process 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 476 Microsoft Office Shared MUI (English) 2010.exe 2016 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Microsoft Office Shared MUI (English) 2010.exeEhStorAuthn.exeb1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum Microsoft Office Shared MUI (English) 2010.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Microsoft Office Shared MUI (English) 2010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe -
Drops file in System32 directory 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EhStorAuthn.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.execmd.exeMicrosoft Office Shared MUI (English) 2010.exeEhStorAuthn.exedescription pid process target process PID 972 wrote to memory of 476 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe Microsoft Office Shared MUI (English) 2010.exe PID 972 wrote to memory of 476 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe Microsoft Office Shared MUI (English) 2010.exe PID 972 wrote to memory of 476 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe Microsoft Office Shared MUI (English) 2010.exe PID 972 wrote to memory of 476 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe Microsoft Office Shared MUI (English) 2010.exe PID 972 wrote to memory of 772 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe cmd.exe PID 972 wrote to memory of 772 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe cmd.exe PID 972 wrote to memory of 772 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe cmd.exe PID 972 wrote to memory of 772 972 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe cmd.exe PID 772 wrote to memory of 1036 772 cmd.exe PING.EXE PID 772 wrote to memory of 1036 772 cmd.exe PING.EXE PID 772 wrote to memory of 1036 772 cmd.exe PING.EXE PID 772 wrote to memory of 1036 772 cmd.exe PING.EXE PID 772 wrote to memory of 1076 772 cmd.exe cmd.exe PID 772 wrote to memory of 1076 772 cmd.exe cmd.exe PID 772 wrote to memory of 1076 772 cmd.exe cmd.exe PID 772 wrote to memory of 1076 772 cmd.exe cmd.exe PID 476 wrote to memory of 2016 476 Microsoft Office Shared MUI (English) 2010.exe EhStorAuthn.exe PID 476 wrote to memory of 2016 476 Microsoft Office Shared MUI (English) 2010.exe EhStorAuthn.exe PID 476 wrote to memory of 2016 476 Microsoft Office Shared MUI (English) 2010.exe EhStorAuthn.exe PID 476 wrote to memory of 2016 476 Microsoft Office Shared MUI (English) 2010.exe EhStorAuthn.exe PID 476 wrote to memory of 2016 476 Microsoft Office Shared MUI (English) 2010.exe EhStorAuthn.exe PID 2016 wrote to memory of 1964 2016 EhStorAuthn.exe schtasks.exe PID 2016 wrote to memory of 1964 2016 EhStorAuthn.exe schtasks.exe PID 2016 wrote to memory of 1964 2016 EhStorAuthn.exe schtasks.exe PID 2016 wrote to memory of 1964 2016 EhStorAuthn.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe"C:\Users\Admin\AppData\Local\Temp\b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Shared MUI (English) 2010.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Shared MUI (English) 2010.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:1964
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:1036
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:1076
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Shared MUI (English) 2010.exe
MD5e640bdb76d7b30cb9ca9250d5b6631e3
SHA10540792efa9eb7ecdcfce3340dc0be1204c1e8c8
SHA256b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42
SHA5120d9bbc8f82a212cbb92595f2d5e7e4e1bab00061286f04441dce4c383827e3d55a60afee4e1d52b2af4ded201c5c54c046a4065ca055cfa1448b807a4a4a2034
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Shared MUI (English) 2010.exe
MD5e640bdb76d7b30cb9ca9250d5b6631e3
SHA10540792efa9eb7ecdcfce3340dc0be1204c1e8c8
SHA256b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42
SHA5120d9bbc8f82a212cbb92595f2d5e7e4e1bab00061286f04441dce4c383827e3d55a60afee4e1d52b2af4ded201c5c54c046a4065ca055cfa1448b807a4a4a2034
-
MD5
a4e647734e5d81ca311fb08c0dcd18cb
SHA1b87f1e31d58a07f60c903927720825a92a3840b5
SHA256ea8621af8832071483084f0ddb156ab7eb7349d14ec03d3d08b881cb941a1143
SHA51226514370f3fb5c99b1e0c986ba9ec1387536e7b010025d3dd479d390c4662f9d722c0ed243b8b902bcd3b882e8a2f7102e9b93dcff2f5cbb5a8c54c59660f006
-
MD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
MD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Shared MUI (English) 2010.exe
MD5e640bdb76d7b30cb9ca9250d5b6631e3
SHA10540792efa9eb7ecdcfce3340dc0be1204c1e8c8
SHA256b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42
SHA5120d9bbc8f82a212cbb92595f2d5e7e4e1bab00061286f04441dce4c383827e3d55a60afee4e1d52b2af4ded201c5c54c046a4065ca055cfa1448b807a4a4a2034
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Shared MUI (English) 2010.exe
MD5e640bdb76d7b30cb9ca9250d5b6631e3
SHA10540792efa9eb7ecdcfce3340dc0be1204c1e8c8
SHA256b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42
SHA5120d9bbc8f82a212cbb92595f2d5e7e4e1bab00061286f04441dce4c383827e3d55a60afee4e1d52b2af4ded201c5c54c046a4065ca055cfa1448b807a4a4a2034