Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 09:54

General

  • Target

    1e6596320a3fa48d8c13609a66e639b35fb1e9caae378552956aa9659809162b.exe

  • Size

    1.5MB

  • MD5

    13ea6a80588a9eeea6b919a4f104a7de

  • SHA1

    7e79e0459e7aa0fa54bd5a2e5e79b6c0587f2334

  • SHA256

    1e6596320a3fa48d8c13609a66e639b35fb1e9caae378552956aa9659809162b

  • SHA512

    a3c212e76c7dc8328ea501abba5f76cf01c52b3bc7a60b7ec2eeff2af83537defbde1cecc22b6618b70390f81b46a47a4e5a10cea734d1e7d5cbb5db46613e73

  • SSDEEP

    24576:PRfrBt/w6kIzuGIwlweXNivgGqG0ronl7Nti7VclubgkL:PRc6yGfweXNivgVp0nl7/mVc4s2

Malware Config

Signatures

  • SaintBot

    Saint Bot is a malware dropper being used to deliver secondary payloads such as information stealers.

  • SaintBot payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e6596320a3fa48d8c13609a66e639b35fb1e9caae378552956aa9659809162b.exe
    "C:\Users\Admin\AppData\Local\Temp\1e6596320a3fa48d8c13609a66e639b35fb1e9caae378552956aa9659809162b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Local\Temp\1e6596320a3fa48d8c13609a66e639b35fb1e9caae378552956aa9659809162b.exe
      "C:\Users\Admin\AppData\Local\Temp\1e6596320a3fa48d8c13609a66e639b35fb1e9caae378552956aa9659809162b.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Maps connected drives based on registry
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\17743.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\17743.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1348
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Windows\SysWOW64\PING.EXE
          ping localhost -n 3
          4⤵
          • Runs ping.exe
          PID:1968
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"
          4⤵
            PID:3288

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\17743.exe

      Filesize

      1.5MB

      MD5

      13ea6a80588a9eeea6b919a4f104a7de

      SHA1

      7e79e0459e7aa0fa54bd5a2e5e79b6c0587f2334

      SHA256

      1e6596320a3fa48d8c13609a66e639b35fb1e9caae378552956aa9659809162b

      SHA512

      a3c212e76c7dc8328ea501abba5f76cf01c52b3bc7a60b7ec2eeff2af83537defbde1cecc22b6618b70390f81b46a47a4e5a10cea734d1e7d5cbb5db46613e73

    • C:\Users\Admin\AppData\Roaming\del.bat

      Filesize

      169B

      MD5

      441825bd87d8ee749c2f4aa9c24e3306

      SHA1

      b1a8d72b95ec14cf8c680d7440e373f4c6ca81c7

      SHA256

      bca1724f68c5355850de114b9313ee195d8f72fd2a36e70e4e515e19594db5a1

      SHA512

      1980e5e8b36668ad19ebeedfac322d97ce9f1acba00eef92072ab6d68af9fc817f276acbd1d60d75a696264427b34de41fb57da2085ed1af2eac369cf8a7c8da

    • memory/1348-40-0x0000000073B60000-0x0000000074310000-memory.dmp

      Filesize

      7.7MB

    • memory/1348-38-0x00000000054F0000-0x0000000005500000-memory.dmp

      Filesize

      64KB

    • memory/1348-37-0x0000000005600000-0x0000000005954000-memory.dmp

      Filesize

      3.3MB

    • memory/1348-35-0x0000000073B60000-0x0000000074310000-memory.dmp

      Filesize

      7.7MB

    • memory/1428-12-0x0000000007210000-0x0000000007224000-memory.dmp

      Filesize

      80KB

    • memory/1428-5-0x0000000005FB0000-0x0000000006156000-memory.dmp

      Filesize

      1.6MB

    • memory/1428-8-0x0000000006F20000-0x0000000006F48000-memory.dmp

      Filesize

      160KB

    • memory/1428-9-0x0000000006FD0000-0x0000000007036000-memory.dmp

      Filesize

      408KB

    • memory/1428-10-0x0000000006FA0000-0x0000000006FC2000-memory.dmp

      Filesize

      136KB

    • memory/1428-11-0x0000000005DF0000-0x0000000005E00000-memory.dmp

      Filesize

      64KB

    • memory/1428-0-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/1428-13-0x0000000007220000-0x0000000007226000-memory.dmp

      Filesize

      24KB

    • memory/1428-1-0x0000000000670000-0x00000000007EA000-memory.dmp

      Filesize

      1.5MB

    • memory/1428-2-0x0000000005710000-0x0000000005CB4000-memory.dmp

      Filesize

      5.6MB

    • memory/1428-21-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/1428-6-0x0000000005CC0000-0x0000000005D5C000-memory.dmp

      Filesize

      624KB

    • memory/1428-3-0x0000000005200000-0x0000000005292000-memory.dmp

      Filesize

      584KB

    • memory/1428-7-0x0000000005DF0000-0x0000000005E00000-memory.dmp

      Filesize

      64KB

    • memory/1428-4-0x00000000052A0000-0x00000000055F4000-memory.dmp

      Filesize

      3.3MB

    • memory/4928-34-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4928-15-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4928-14-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB