Analysis
-
max time kernel
112s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-07-2022 00:07
Static task
static1
Behavioral task
behavioral1
Sample
49555ffb1acfd634bb20aab6bbb9aa3b7d953db6984949f7336668c9429fa86d.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
49555ffb1acfd634bb20aab6bbb9aa3b7d953db6984949f7336668c9429fa86d.exe
-
Size
3.3MB
-
MD5
b4cc346bf020b471e0c3a670857e34b0
-
SHA1
298c8b97b14dd90efe7c5f0143637976d4b7d1de
-
SHA256
49555ffb1acfd634bb20aab6bbb9aa3b7d953db6984949f7336668c9429fa86d
-
SHA512
e9aa62b1fb6ce5a06374a235d357ce1e2b74b0b0f4ffb5109a9653f54338874b23b49c57c328071e3ea44c74bb86032314d818bd37da2dd6bdd3dbd27f99ebfd
Malware Config
Signatures
-
SaintBot payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1540-130-0x0000000000400000-0x0000000000748000-memory.dmp family_saintbot -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
49555ffb1acfd634bb20aab6bbb9aa3b7d953db6984949f7336668c9429fa86d.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\start /b "" cmd /c del "%~f0"&exit /b 49555ffb1acfd634bb20aab6bbb9aa3b7d953db6984949f7336668c9429fa86d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 49555ffb1acfd634bb20aab6bbb9aa3b7d953db6984949f7336668c9429fa86d.exe