Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 07:58
Behavioral task
behavioral1
Sample
ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe
Resource
win10v2004-20240221-en
General
-
Target
ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe
-
Size
29KB
-
MD5
88d9e88e61e538f89688f26ab43fc3a5
-
SHA1
7e77b925973755da363ad876c31d3552e91ed725
-
SHA256
ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96
-
SHA512
f37fb5b200dc54ea2e0ac57e6ac9c0a3681e9c1fe2e17c0edebc9b457dfabc4e23075f54a2c8d783afa4227356c26f92a10eda1b6a5583d9a60928efe2b57cc8
-
SSDEEP
768:Jv9SiOBEcXWrfRsA0hNnuHmrhCOWo12vTzXTbH32:8Xqk6HDOWrzPm
Malware Config
Signatures
-
SaintBot payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\39608.exe family_saintbot behavioral2/memory/3740-16-0x0000000000A20000-0x0000000000A2C000-memory.dmp family_saintbot behavioral2/memory/3740-18-0x0000000000A20000-0x0000000000A2C000-memory.dmp family_saintbot behavioral2/memory/3740-19-0x0000000000A20000-0x0000000000A2C000-memory.dmp family_saintbot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe -
Drops startup file 2 IoCs
Processes:
39608.exeac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\39608.exe 39608.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\39608.exe ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe -
Executes dropped EXE 1 IoCs
Processes:
39608.exepid process 3916 39608.exe -
Loads dropped DLL 2 IoCs
Processes:
39608.exeEhStorAuthn.exepid process 3916 39608.exe 3740 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
39608.exeEhStorAuthn.exeac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 39608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 39608.exe -
Drops file in System32 directory 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EhStorAuthn.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
EhStorAuthn.exedescription pid process Token: SeDebugPrivilege 3740 EhStorAuthn.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.execmd.exe39608.exedescription pid process target process PID 4976 wrote to memory of 3916 4976 ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe 39608.exe PID 4976 wrote to memory of 3916 4976 ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe 39608.exe PID 4976 wrote to memory of 3916 4976 ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe 39608.exe PID 4976 wrote to memory of 4952 4976 ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe cmd.exe PID 4976 wrote to memory of 4952 4976 ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe cmd.exe PID 4976 wrote to memory of 4952 4976 ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe cmd.exe PID 4952 wrote to memory of 2636 4952 cmd.exe PING.EXE PID 4952 wrote to memory of 2636 4952 cmd.exe PING.EXE PID 4952 wrote to memory of 2636 4952 cmd.exe PING.EXE PID 4952 wrote to memory of 3236 4952 cmd.exe cmd.exe PID 4952 wrote to memory of 3236 4952 cmd.exe cmd.exe PID 4952 wrote to memory of 3236 4952 cmd.exe cmd.exe PID 3916 wrote to memory of 3740 3916 39608.exe EhStorAuthn.exe PID 3916 wrote to memory of 3740 3916 39608.exe EhStorAuthn.exe PID 3916 wrote to memory of 3740 3916 39608.exe EhStorAuthn.exe PID 3916 wrote to memory of 3740 3916 39608.exe EhStorAuthn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe"C:\Users\Admin\AppData\Local\Temp\ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96.exe"1⤵
- Checks computer location settings
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\39608.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\39608.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:2636
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:3236
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
29KB
MD588d9e88e61e538f89688f26ab43fc3a5
SHA17e77b925973755da363ad876c31d3552e91ed725
SHA256ac38403a3188bfe31850a3710cdd1311abe9f7bdaa0e23add7eda61960572f96
SHA512f37fb5b200dc54ea2e0ac57e6ac9c0a3681e9c1fe2e17c0edebc9b457dfabc4e23075f54a2c8d783afa4227356c26f92a10eda1b6a5583d9a60928efe2b57cc8
-
Filesize
170B
MD5462f62f0909bb4094987c1f4bed77bbb
SHA1e9ca0d414522cfcffae0491fd8beb6b0cd7a0e5b
SHA2560867276cd132942c93c5c6882ec81e645d2c336aedd7f6a987aaa826ec1bb01b
SHA5124ed460675630ffef36428cbc8d698f7450f6f0cb9188335af98572405d0539970af450139cb49a3c6de86b5b8060f98cb19c9df632d4734d8974c51d6932d105