Analysis
-
max time kernel
160s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 08:00
Static task
static1
Behavioral task
behavioral1
Sample
sts.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
sts.exe
Resource
win10v2004-20220722-en
General
-
Target
sts.exe
-
Size
1.7MB
-
MD5
c290cd24892905fbcf3cb39929de19a5
-
SHA1
4d105c8331d23ded5de85fb18dbe552c73c0998d
-
SHA256
3e3f8570c11dff0b5a0e061eae6bdd66cf9fa01d815658a0589d98873500358d
-
SHA512
f25e7a23f855a7e99e8931455368cd97e6d23a9680dc737fb134726a0b3bb965db99b1d1d1d01d156fef3190d296ce2b7bcd5eb39b587ba685516140a3a22ef9
Malware Config
Signatures
-
SatanCryptor
Golang ransomware first seen in early 2020.
-
Executes dropped EXE 1 IoCs
pid Process 1256 Satan.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation sts.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Satan.exe File opened (read-only) \??\W: Satan.exe File opened (read-only) \??\O: Satan.exe File opened (read-only) \??\N: Satan.exe File opened (read-only) \??\Y: Satan.exe File opened (read-only) \??\K: Satan.exe File opened (read-only) \??\G: Satan.exe File opened (read-only) \??\H: Satan.exe File opened (read-only) \??\F: Satan.exe File opened (read-only) \??\A: Satan.exe File opened (read-only) \??\T: Satan.exe File opened (read-only) \??\L: Satan.exe File opened (read-only) \??\J: Satan.exe File opened (read-only) \??\U: Satan.exe File opened (read-only) \??\S: Satan.exe File opened (read-only) \??\R: Satan.exe File opened (read-only) \??\Q: Satan.exe File opened (read-only) \??\P: Satan.exe File opened (read-only) \??\Z: Satan.exe File opened (read-only) \??\X: Satan.exe File opened (read-only) \??\V: Satan.exe File opened (read-only) \??\M: Satan.exe File opened (read-only) \??\I: Satan.exe File opened (read-only) \??\B: Satan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 12368 1256 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4504 wrote to memory of 1256 4504 sts.exe 85 PID 4504 wrote to memory of 1256 4504 sts.exe 85 PID 4504 wrote to memory of 1256 4504 sts.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\sts.exe"C:\Users\Admin\AppData\Local\Temp\sts.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Satan.exe"C:\Satan.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
PID:1256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 9083⤵
- Program crash
PID:12368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1256 -ip 12561⤵PID:12488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD54153cbc1f51bca54ba1e948a3653185b
SHA1090e58b0b9ce144598b375c0c206289308535ef3
SHA256cf12eca0e10dc3370d7917e7678dc09629240d3e7cc71c5ac0df68576bea0682
SHA512d1232323496022e2e48dfa372d9d3844ebd31a2390896bca3914d246666cc29a4019313acf23458c540baa07a261023adf46da5315d21ee0557a0b5eb406fb7f
-
Filesize
142KB
MD54153cbc1f51bca54ba1e948a3653185b
SHA1090e58b0b9ce144598b375c0c206289308535ef3
SHA256cf12eca0e10dc3370d7917e7678dc09629240d3e7cc71c5ac0df68576bea0682
SHA512d1232323496022e2e48dfa372d9d3844ebd31a2390896bca3914d246666cc29a4019313acf23458c540baa07a261023adf46da5315d21ee0557a0b5eb406fb7f