Overview
overview
10Static
static
10084a818817...f2.exe
windows7-x64
10084a818817...f2.exe
windows10-2004-x64
1025f38c1ea9...bd.exe
windows7-x64
1025f38c1ea9...bd.exe
windows10-2004-x64
1065a67ae4ac...b4.jar
windows7-x64
165a67ae4ac...b4.jar
windows10-2004-x64
1d7ab78ce47...09.exe
windows7-x64
10d7ab78ce47...09.exe
windows10-2004-x64
10daff68b6fa...77.exe
windows7-x64
10daff68b6fa...77.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 09:47
Behavioral task
behavioral1
Sample
084a81881745038f4fa7227b92aed4a0ad3603d1063cfc100f0adffbfc55eef2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
084a81881745038f4fa7227b92aed4a0ad3603d1063cfc100f0adffbfc55eef2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
25f38c1ea9b72f30be7df57ee6c0a358de7c23d59c2a0dd5f9c8c787c863abbd.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
25f38c1ea9b72f30be7df57ee6c0a358de7c23d59c2a0dd5f9c8c787c863abbd.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
65a67ae4ac7290dbdba5832de2128461f68d6b5f37321bc2c4f82087342728b4.jar
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
65a67ae4ac7290dbdba5832de2128461f68d6b5f37321bc2c4f82087342728b4.jar
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
d7ab78ce470e7e7f745d06f364a88c3e8b04cc649324380497d9faf4aa93c009.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
d7ab78ce470e7e7f745d06f364a88c3e8b04cc649324380497d9faf4aa93c009.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
daff68b6fa20239505d252f3a5d6c07219d2a0ffdcb782633645a864b334fe77.exe
Resource
win7-20230220-en
General
-
Target
25f38c1ea9b72f30be7df57ee6c0a358de7c23d59c2a0dd5f9c8c787c863abbd.exe
-
Size
1.7MB
-
MD5
58d30af5992e33b351293b23ce97724f
-
SHA1
22e8cd9c08037ea925d57355c4ae142490688bb9
-
SHA256
25f38c1ea9b72f30be7df57ee6c0a358de7c23d59c2a0dd5f9c8c787c863abbd
-
SHA512
e3c5034f07d85a4cf4f3de8314fb332ebdab3ed5e6058340951bf3482cd03ee2ceb42817bc2fcb8d12c3a5becdb52896d7bd8ff72c8c978034626cc7fd93244d
-
SSDEEP
49152:BRoNt5F+/BocHmdgcmPH8fKr1HbYObrTTAj/unm0yJk:DoNt5E/BoC6gcCcfKtjfnvkk
Malware Config
Signatures
-
SatanCryptor
Golang ransomware first seen in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
25f38c1ea9b72f30be7df57ee6c0a358de7c23d59c2a0dd5f9c8c787c863abbd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 25f38c1ea9b72f30be7df57ee6c0a358de7c23d59c2a0dd5f9c8c787c863abbd.exe -
Executes dropped EXE 1 IoCs
Processes:
Satan.exepid process 1228 Satan.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Satan.exedescription ioc process File opened (read-only) \??\J: Satan.exe File opened (read-only) \??\F: Satan.exe File opened (read-only) \??\Z: Satan.exe File opened (read-only) \??\U: Satan.exe File opened (read-only) \??\K: Satan.exe File opened (read-only) \??\P: Satan.exe File opened (read-only) \??\O: Satan.exe File opened (read-only) \??\H: Satan.exe File opened (read-only) \??\W: Satan.exe File opened (read-only) \??\T: Satan.exe File opened (read-only) \??\R: Satan.exe File opened (read-only) \??\N: Satan.exe File opened (read-only) \??\L: Satan.exe File opened (read-only) \??\I: Satan.exe File opened (read-only) \??\G: Satan.exe File opened (read-only) \??\Y: Satan.exe File opened (read-only) \??\X: Satan.exe File opened (read-only) \??\V: Satan.exe File opened (read-only) \??\E: Satan.exe File opened (read-only) \??\B: Satan.exe File opened (read-only) \??\A: Satan.exe File opened (read-only) \??\S: Satan.exe File opened (read-only) \??\Q: Satan.exe File opened (read-only) \??\M: Satan.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Satan.exedescription ioc process File opened for modification C:\Program Files\Java\jre1.8.0_66\[[email protected]]README.txt.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]MondoR_SubTrial-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]O365ProPlusEDUR_Subscription-pl.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProjectPro2019XC2RVL_MAKC2R-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProjectStdCO365R_Subscription-pl.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProPlusDemoR_BypassTrial180-ul-oob.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]PublisherR_Grace-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\[[email protected]]AppXManifestLoc.16.en-us.xml.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]HomeBusinessR_OEM_Perp3-pl.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]MondoVL_MAK-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]O365SmallBusPremR_Subscription2-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\[[email protected]]AppXManifest.90160000-3101-0000-1000-0000000FF1CE.xml.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]HomeStudent2019R_Grace-ul-oob.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]O365HomePremR_SubTest3-ul-oob.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProPlusR_OEM_Perp4-ul-phn.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]O365SmallBusPremDemoR_BypassTrial365-ul-oob.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProPlus2019VL_MAK_AE-pl.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]HomeBusinessR_OEM_Perp4-ul-phn.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]O365HomePremR_Subscription3-pl.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\[[email protected]]Century Schoolbook.xml.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]O365HomePremR_SubTrial3-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProPlus2019R_OEM_Perp6-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\[[email protected]]chrome.7z.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]HomeBusinessR_Retail3-pl.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\[[email protected]]Grunge Texture.eftx.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]HomeBusiness2019R_OEM_Perp-ul-phn.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]O365ProPlusEDUR_Subscription-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]VisioPro2019R_OEM_Perp-pl.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\7-Zip\Lang\[[email protected]]gu.txt.satan Satan.exe File opened for modification C:\Program Files\7-Zip\Lang\[[email protected]]tr.txt.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\[[email protected]]Blue.xml.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]OneNoteR_Retail-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]Outlook2019R_Retail-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProPlusR_Trial-ul-oob.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\7-Zip\Lang\[[email protected]]mr.txt.satan Satan.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\[[email protected]]COPYRIGHT.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]HomeStudentVNextR_Retail-ul-oob.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]Outlook2019VL_KMS_Client_AE-ul.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]OutlookR_Retail-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProPlusR_Trial-pl.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\[[email protected]]et.pak.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]AccessR_Retail-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]PublisherVL_MAK-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]HomeBusinessDemoR_BypassTrial365-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProjectStdR_Retail-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]PowerPointVL_MAK-ul-phn.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProjectStdXC2RVL_MAKC2R-ul-phn.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\[[email protected]]C2RManifest.office32ww.msi.16.x-none.xml.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]Excel2019VL_KMS_Client_AE-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\[[email protected]]THIRDPARTYLICENSEREADME-JAVAFX.txt.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\[[email protected]]AppXManifest.common.16.xml.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\fre\[[email protected]]StartMenu_Win10.mp4.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]HomeStudentR_Trial-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProPlusR_Grace-ppd.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]PublisherR_Trial-pl.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\7-Zip\Lang\[[email protected]]ba.txt.satan Satan.exe File opened for modification C:\Program Files\7-Zip\Lang\[[email protected]]ps.txt.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProjectStdR_OEM_Perp-ul-oob.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProjectStdXC2RVL_MAKC2R-ul-oob.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]O365ProPlusR_Subscription5-pl.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProjectStdCO365R_SubTrial-ul-oob.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\[[email protected]]kn.pak.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]MondoVL_MAK-ul-phn.xrm-ms.satan Satan.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[[email protected]]ProjectProXC2RVL_KMS_ClientC2R-ul.xrm-ms.satan Satan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
25f38c1ea9b72f30be7df57ee6c0a358de7c23d59c2a0dd5f9c8c787c863abbd.exedescription pid process target process PID 2660 wrote to memory of 1228 2660 25f38c1ea9b72f30be7df57ee6c0a358de7c23d59c2a0dd5f9c8c787c863abbd.exe Satan.exe PID 2660 wrote to memory of 1228 2660 25f38c1ea9b72f30be7df57ee6c0a358de7c23d59c2a0dd5f9c8c787c863abbd.exe Satan.exe PID 2660 wrote to memory of 1228 2660 25f38c1ea9b72f30be7df57ee6c0a358de7c23d59c2a0dd5f9c8c787c863abbd.exe Satan.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25f38c1ea9b72f30be7df57ee6c0a358de7c23d59c2a0dd5f9c8c787c863abbd.exe"C:\Users\Admin\AppData\Local\Temp\25f38c1ea9b72f30be7df57ee6c0a358de7c23d59c2a0dd5f9c8c787c863abbd.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Satan.exe"C:\Satan.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
PID:1228
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143KB
MD51fedee59eb95756282cff2493da93689
SHA1dde1ee119b5c2e1facd22df44b7487f17f319c84
SHA256480e8c67f2354530c006380d4804f4bacb1016f0401f391303e3337be94fbb11
SHA512076c3b3ce6b96150e16daa5a49c0fd0762260d183c633d1fa58c9d48c38bfed914c9b69da0e7f5fe68d66edbec6706311dc3859e65d474f1495ce741297f0317
-
Filesize
143KB
MD51fedee59eb95756282cff2493da93689
SHA1dde1ee119b5c2e1facd22df44b7487f17f319c84
SHA256480e8c67f2354530c006380d4804f4bacb1016f0401f391303e3337be94fbb11
SHA512076c3b3ce6b96150e16daa5a49c0fd0762260d183c633d1fa58c9d48c38bfed914c9b69da0e7f5fe68d66edbec6706311dc3859e65d474f1495ce741297f0317
-
Filesize
143KB
MD51fedee59eb95756282cff2493da93689
SHA1dde1ee119b5c2e1facd22df44b7487f17f319c84
SHA256480e8c67f2354530c006380d4804f4bacb1016f0401f391303e3337be94fbb11
SHA512076c3b3ce6b96150e16daa5a49c0fd0762260d183c633d1fa58c9d48c38bfed914c9b69da0e7f5fe68d66edbec6706311dc3859e65d474f1495ce741297f0317