Analysis
-
max time kernel
152s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-04-2022 02:37
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Ransom.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Trojan.Ransom.exe
Resource
win10v2004-20220414-en
General
-
Target
Trojan.Ransom.exe
-
Size
49KB
-
MD5
46bfd4f1d581d7c0121d2b19a005d3df
-
SHA1
5b063298bbd1670b4d39e1baef67f854b8dcba9d
-
SHA256
683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
-
SHA512
b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!satana!.txt
Signatures
-
Satana
Ransomware family which also encrypts the system's Master Boot Record (MBR).
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
uycsvtb.exeuycsvtb.exepid process 1548 uycsvtb.exe 1152 uycsvtb.exe -
Deletes itself 1 IoCs
Processes:
uycsvtb.exepid process 1152 uycsvtb.exe -
Loads dropped DLL 6 IoCs
Processes:
Trojan.Ransom.exeuycsvtb.exeuycsvtb.exepid process 1100 Trojan.Ransom.exe 1100 Trojan.Ransom.exe 1100 Trojan.Ransom.exe 1100 Trojan.Ransom.exe 1548 uycsvtb.exe 1152 uycsvtb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Trojan.Ransom.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Trojan.Ransom.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\zefmxag = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" Trojan.Ransom.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
uycsvtb.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 uycsvtb.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Trojan.Ransom.exeuycsvtb.exedescription pid process target process PID 1724 set thread context of 1100 1724 Trojan.Ransom.exe Trojan.Ransom.exe PID 1548 set thread context of 1152 1548 uycsvtb.exe uycsvtb.exe -
Drops file in Program Files directory 64 IoCs
Processes:
uycsvtb.exedescription ioc process File created C:\Program Files\Microsoft Games\More Games\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\DigitalInk.jpg uycsvtb.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\EmptyDatabase.zip uycsvtb.exe File created C:\Program Files\VideoLAN\VLC\locale\he\!satana!.txt uycsvtb.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\!satana!.txt uycsvtb.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_FileOffMask.bmp uycsvtb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\logo.png uycsvtb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\47.png uycsvtb.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\win32_MoveDrop32x32.gif uycsvtb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_bottom.png uycsvtb.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\!satana!.txt uycsvtb.exe File created C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\!satana!.txt uycsvtb.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\back.png uycsvtb.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\help.gif uycsvtb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-common.xml uycsvtb.exe File created C:\Program Files\Mozilla Firefox\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\buttons.png uycsvtb.exe File created C:\Program Files\Windows Defender\it-IT\!satana!.txt uycsvtb.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\!satana!.txt uycsvtb.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\!satana!.txt uycsvtb.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SubsetList\!satana!.txt uycsvtb.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\!satana!.txt uycsvtb.exe File created C:\Program Files\Java\jre7\lib\zi\America\Kentucky\!satana!.txt uycsvtb.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIconsMask.bmp uycsvtb.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml uycsvtb.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_single.png uycsvtb.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\it-IT\!satana!.txt uycsvtb.exe File created C:\Program Files (x86)\Common Files\System\ado\fr-FR\!satana!.txt uycsvtb.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Sort\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaireMCE.png uycsvtb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_left_pressed.png uycsvtb.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Newsprint.xml uycsvtb.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_uparrow.png uycsvtb.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\grayStateIcon.png uycsvtb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\pushplaysubpicture.png uycsvtb.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\!satana!.txt uycsvtb.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\MediaReceiverRegistrar.xml uycsvtb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Couture.xml uycsvtb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\dial_sml.png uycsvtb.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\!satana!.txt uycsvtb.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\!satana!.txt uycsvtb.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waxing-gibbous_partly-cloudy.png uycsvtb.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\!satana!.txt uycsvtb.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\!satana!.txt uycsvtb.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-new.png uycsvtb.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\!satana!.txt uycsvtb.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\!satana!.txt uycsvtb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\DataListIconImages.jpg uycsvtb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-execution.xml uycsvtb.exe File created C:\Program Files\Microsoft Games\Chess\!satana!.txt uycsvtb.exe File created C:\Program Files (x86)\Google\Update\Download\!satana!.txt uycsvtb.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\!satana!.txt uycsvtb.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\!satana!.txt uycsvtb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
VSSADMIN.EXEpid process 1048 VSSADMIN.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
uycsvtb.exevssvc.exedescription pid process Token: SeIncBasePriorityPrivilege 1152 uycsvtb.exe Token: SeBackupPrivilege 1636 vssvc.exe Token: SeRestorePrivilege 1636 vssvc.exe Token: SeAuditPrivilege 1636 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
Trojan.Ransom.exeTrojan.Ransom.exeuycsvtb.exeuycsvtb.exedescription pid process target process PID 1724 wrote to memory of 1100 1724 Trojan.Ransom.exe Trojan.Ransom.exe PID 1724 wrote to memory of 1100 1724 Trojan.Ransom.exe Trojan.Ransom.exe PID 1724 wrote to memory of 1100 1724 Trojan.Ransom.exe Trojan.Ransom.exe PID 1724 wrote to memory of 1100 1724 Trojan.Ransom.exe Trojan.Ransom.exe PID 1724 wrote to memory of 1100 1724 Trojan.Ransom.exe Trojan.Ransom.exe PID 1724 wrote to memory of 1100 1724 Trojan.Ransom.exe Trojan.Ransom.exe PID 1724 wrote to memory of 1100 1724 Trojan.Ransom.exe Trojan.Ransom.exe PID 1724 wrote to memory of 1100 1724 Trojan.Ransom.exe Trojan.Ransom.exe PID 1724 wrote to memory of 1100 1724 Trojan.Ransom.exe Trojan.Ransom.exe PID 1724 wrote to memory of 1100 1724 Trojan.Ransom.exe Trojan.Ransom.exe PID 1100 wrote to memory of 1548 1100 Trojan.Ransom.exe uycsvtb.exe PID 1100 wrote to memory of 1548 1100 Trojan.Ransom.exe uycsvtb.exe PID 1100 wrote to memory of 1548 1100 Trojan.Ransom.exe uycsvtb.exe PID 1100 wrote to memory of 1548 1100 Trojan.Ransom.exe uycsvtb.exe PID 1548 wrote to memory of 1152 1548 uycsvtb.exe uycsvtb.exe PID 1548 wrote to memory of 1152 1548 uycsvtb.exe uycsvtb.exe PID 1548 wrote to memory of 1152 1548 uycsvtb.exe uycsvtb.exe PID 1548 wrote to memory of 1152 1548 uycsvtb.exe uycsvtb.exe PID 1548 wrote to memory of 1152 1548 uycsvtb.exe uycsvtb.exe PID 1548 wrote to memory of 1152 1548 uycsvtb.exe uycsvtb.exe PID 1548 wrote to memory of 1152 1548 uycsvtb.exe uycsvtb.exe PID 1548 wrote to memory of 1152 1548 uycsvtb.exe uycsvtb.exe PID 1548 wrote to memory of 1152 1548 uycsvtb.exe uycsvtb.exe PID 1548 wrote to memory of 1152 1548 uycsvtb.exe uycsvtb.exe PID 1152 wrote to memory of 1048 1152 uycsvtb.exe VSSADMIN.EXE PID 1152 wrote to memory of 1048 1152 uycsvtb.exe VSSADMIN.EXE PID 1152 wrote to memory of 1048 1152 uycsvtb.exe VSSADMIN.EXE PID 1152 wrote to memory of 1048 1152 uycsvtb.exe VSSADMIN.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Ransom.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Ransom.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Trojan.Ransom.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Ransom.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\uycsvtb.exe"C:\Users\Admin\AppData\Local\Temp\uycsvtb.exe" {846ee340-7039-11de-9d20-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\TROJAN~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\uycsvtb.exe"C:\Users\Admin\AppData\Local\Temp\uycsvtb.exe" {846ee340-7039-11de-9d20-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\TROJAN~1.EXE"4⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\VSSADMIN.EXE"C:\Windows\system32\VSSADMIN.EXE" Delete Shadows /All /Quiet5⤵
- Interacts with shadow copies
PID:1048
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c588311345ad462b264edbdcafbf9bf0
SHA1ee2ee48b791c700ba82294edc8abf1c6b3f6ad99
SHA256f85aa2765100e6248394ce0bb0e8368e9d3daa63e4d27190bb8f243539a390c4
SHA512a24451b006b947108de740ecd5d83c7cb0b039e1b2b9a9d65ddab4ba1aa7f8b09a1a3ca1d53aaa5df6fa610095ed2deb8ffa7e9c1809d0c9866a66e07f9058af
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5