Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
28-02-2022 03:13
Static task
static1
Behavioral task
behavioral1
Sample
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe
Resource
win10v2004-en-20220113
General
-
Target
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe
-
Size
269KB
-
MD5
e640bdb76d7b30cb9ca9250d5b6631e3
-
SHA1
0540792efa9eb7ecdcfce3340dc0be1204c1e8c8
-
SHA256
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42
-
SHA512
0d9bbc8f82a212cbb92595f2d5e7e4e1bab00061286f04441dce4c383827e3d55a60afee4e1d52b2af4ded201c5c54c046a4065ca055cfa1448b807a4a4a2034
Malware Config
Signatures
-
SaintBot Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2456-132-0x0000000000030000-0x0000000000039000-memory.dmp family_saintbot behavioral2/memory/2456-133-0x0000000000400000-0x000000000040C000-memory.dmp family_saintbot behavioral2/memory/4128-141-0x0000000000430000-0x000000000043C000-memory.dmp family_saintbot -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 3464 created 2456 3464 WerFault.exe b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe PID 2560 created 3688 2560 WerFault.exe 27718.exe -
suricata: ET MALWARE Saint Bot CnC Activity
suricata: ET MALWARE Saint Bot CnC Activity
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Executes dropped EXE 1 IoCs
Processes:
27718.exepid process 3688 27718.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe -
Drops startup file 2 IoCs
Processes:
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe27718.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\27718.exe b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\27718.exe 27718.exe -
Loads dropped DLL 2 IoCs
Processes:
27718.exeEhStorAuthn.exepid process 3688 27718.exe 4128 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe27718.exeEhStorAuthn.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 27718.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 27718.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe -
Drops file in System32 directory 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4164 2456 WerFault.exe b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 2192 3688 WerFault.exe 27718.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeEhStorAuthn.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
WerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exeWerFault.exepid process 4164 WerFault.exe 4164 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 4164 WerFault.exe Token: SeBackupPrivilege 4164 WerFault.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.execmd.exeWerFault.exe27718.exeWerFault.exeEhStorAuthn.exedescription pid process target process PID 2456 wrote to memory of 3688 2456 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 27718.exe PID 2456 wrote to memory of 3688 2456 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 27718.exe PID 2456 wrote to memory of 3688 2456 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 27718.exe PID 2456 wrote to memory of 3560 2456 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe cmd.exe PID 2456 wrote to memory of 3560 2456 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe cmd.exe PID 2456 wrote to memory of 3560 2456 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe cmd.exe PID 3560 wrote to memory of 3512 3560 cmd.exe PING.EXE PID 3560 wrote to memory of 3512 3560 cmd.exe PING.EXE PID 3560 wrote to memory of 3512 3560 cmd.exe PING.EXE PID 3464 wrote to memory of 2456 3464 WerFault.exe b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe PID 3464 wrote to memory of 2456 3464 WerFault.exe b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe PID 3560 wrote to memory of 5100 3560 cmd.exe cmd.exe PID 3560 wrote to memory of 5100 3560 cmd.exe cmd.exe PID 3560 wrote to memory of 5100 3560 cmd.exe cmd.exe PID 3688 wrote to memory of 4128 3688 27718.exe EhStorAuthn.exe PID 3688 wrote to memory of 4128 3688 27718.exe EhStorAuthn.exe PID 3688 wrote to memory of 4128 3688 27718.exe EhStorAuthn.exe PID 3688 wrote to memory of 4128 3688 27718.exe EhStorAuthn.exe PID 2560 wrote to memory of 3688 2560 WerFault.exe 27718.exe PID 2560 wrote to memory of 3688 2560 WerFault.exe 27718.exe PID 4128 wrote to memory of 3340 4128 EhStorAuthn.exe schtasks.exe PID 4128 wrote to memory of 3340 4128 EhStorAuthn.exe schtasks.exe PID 4128 wrote to memory of 3340 4128 EhStorAuthn.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe"C:\Users\Admin\AppData\Local\Temp\b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe"1⤵
- Checks computer location settings
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\27718.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\27718.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:3340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 6203⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:3512
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:5100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 11442⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2456 -ip 24561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:3464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3688 -ip 36881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:2560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
MD5
4f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
MD5
4f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
MD5
e640bdb76d7b30cb9ca9250d5b6631e3
SHA10540792efa9eb7ecdcfce3340dc0be1204c1e8c8
SHA256b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42
SHA5120d9bbc8f82a212cbb92595f2d5e7e4e1bab00061286f04441dce4c383827e3d55a60afee4e1d52b2af4ded201c5c54c046a4065ca055cfa1448b807a4a4a2034
-
MD5
e640bdb76d7b30cb9ca9250d5b6631e3
SHA10540792efa9eb7ecdcfce3340dc0be1204c1e8c8
SHA256b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42
SHA5120d9bbc8f82a212cbb92595f2d5e7e4e1bab00061286f04441dce4c383827e3d55a60afee4e1d52b2af4ded201c5c54c046a4065ca055cfa1448b807a4a4a2034
-
MD5
a4e647734e5d81ca311fb08c0dcd18cb
SHA1b87f1e31d58a07f60c903927720825a92a3840b5
SHA256ea8621af8832071483084f0ddb156ab7eb7349d14ec03d3d08b881cb941a1143
SHA51226514370f3fb5c99b1e0c986ba9ec1387536e7b010025d3dd479d390c4662f9d722c0ed243b8b902bcd3b882e8a2f7102e9b93dcff2f5cbb5a8c54c59660f006