Analysis
-
max time kernel
121s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
03-03-2022 21:06
Static task
static1
Behavioral task
behavioral1
Sample
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe
Resource
win10v2004-en-20220113
General
-
Target
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe
-
Size
30KB
-
MD5
ab2a92e0fc5a6f63336e442f34089f16
-
SHA1
24f71409bde9d01e3519236e66f3452236302e46
-
SHA256
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c
-
SHA512
50a7e2d4454bd3914cf55fe188f920e08b895c16b9eee498aea2cb71944caf3a3c1266d3b73046179412fd996dfaf48f03fdb39d5662310aa7859faa29d7970e
Malware Config
Signatures
-
SaintBot Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4100-136-0x0000000000360000-0x000000000036B000-memory.dmp family_saintbot -
Executes dropped EXE 1 IoCs
Processes:
44275.exepid process 4156 44275.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe -
Drops startup file 2 IoCs
Processes:
44275.exee8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\44275.exe 44275.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\44275.exe e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe -
Loads dropped DLL 2 IoCs
Processes:
44275.exedfrgui.exepid process 4156 44275.exe 4100 dfrgui.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
dfrgui.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\zzAdmin\\Admin.vbs" dfrgui.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
44275.exedfrgui.exee8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\start /b "" cmd /c del "%~f0"&exit /b 44275.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum dfrgui.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\start /b "" cmd /c del "%~f0"&exit /b dfrgui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\start /b "" cmd /c del "%~f0"&exit /b e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 44275.exe -
Drops file in System32 directory 1 IoCs
Processes:
dfrgui.exedescription ioc process File opened for modification C:\Windows\SysWOW64\dfrgui.exe dfrgui.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dfrgui.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dfrgui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dfrgui.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
44275.exepid process 4156 44275.exe 4156 44275.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe44275.execmd.exedfrgui.exedescription pid process target process PID 3428 wrote to memory of 4156 3428 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe 44275.exe PID 3428 wrote to memory of 4156 3428 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe 44275.exe PID 3428 wrote to memory of 4156 3428 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe 44275.exe PID 3428 wrote to memory of 1808 3428 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe cmd.exe PID 3428 wrote to memory of 1808 3428 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe cmd.exe PID 3428 wrote to memory of 1808 3428 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe cmd.exe PID 4156 wrote to memory of 4100 4156 44275.exe dfrgui.exe PID 4156 wrote to memory of 4100 4156 44275.exe dfrgui.exe PID 4156 wrote to memory of 4100 4156 44275.exe dfrgui.exe PID 1808 wrote to memory of 1168 1808 cmd.exe PING.EXE PID 1808 wrote to memory of 1168 1808 cmd.exe PING.EXE PID 1808 wrote to memory of 1168 1808 cmd.exe PING.EXE PID 4156 wrote to memory of 4100 4156 44275.exe dfrgui.exe PID 1808 wrote to memory of 4528 1808 cmd.exe cmd.exe PID 1808 wrote to memory of 4528 1808 cmd.exe cmd.exe PID 1808 wrote to memory of 4528 1808 cmd.exe cmd.exe PID 4100 wrote to memory of 4616 4100 dfrgui.exe schtasks.exe PID 4100 wrote to memory of 4616 4100 dfrgui.exe schtasks.exe PID 4100 wrote to memory of 4616 4100 dfrgui.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe"C:\Users\Admin\AppData\Local\Temp\e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe"1⤵
- Checks computer location settings
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:1168
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:4528
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\44275.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\44275.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\dfrgui.exe"C:\Windows\system32\dfrgui.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Update" /tr "%SYSTEMDRIVE%\Users\%USERNAME%\AppData\Local\zz%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:4616
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
MD5
4f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
MD5
4f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
MD5
ab2a92e0fc5a6f63336e442f34089f16
SHA124f71409bde9d01e3519236e66f3452236302e46
SHA256e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c
SHA51250a7e2d4454bd3914cf55fe188f920e08b895c16b9eee498aea2cb71944caf3a3c1266d3b73046179412fd996dfaf48f03fdb39d5662310aa7859faa29d7970e
-
MD5
ab2a92e0fc5a6f63336e442f34089f16
SHA124f71409bde9d01e3519236e66f3452236302e46
SHA256e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c
SHA51250a7e2d4454bd3914cf55fe188f920e08b895c16b9eee498aea2cb71944caf3a3c1266d3b73046179412fd996dfaf48f03fdb39d5662310aa7859faa29d7970e
-
MD5
1693d297bdc94f2cb18c8a5d2ef2e095
SHA17a3b9d25c9947ce464f27d80c490e2c444f9d288
SHA2564dd249adcdf2c6dd61f8ad96712f1f125e6c7875874b4790bef1c257a0cb1203
SHA5120983020c73d8251d150c50ec0d03c96e07bb0d6701ae21bdd47a50b6ebdd115a7d8671100c18c1a33019f84598381e6a6895419aa9d6374924bf0583d816919a