Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 11:24
Static task
static1
Behavioral task
behavioral1
Sample
5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe
Resource
win10v2004-20240226-en
General
-
Target
5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe
-
Size
501KB
-
MD5
a7913461e211158d5ac34ac3bd06bc7b
-
SHA1
71c3f7a9eac34b0b5ccd5ec2df01f9c95f14235b
-
SHA256
5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13
-
SHA512
8107feec4426f820d3910e35d6e3c1a1aa85a104231a0529f7fcd825f2dfec10fbf856bc2b37c585a34f5d03b514ece7f54b600add6fb668cda0c7d1a7374e04
-
SSDEEP
6144:9moTTLsn36PcB1jtNSHoLR0XbZEpGidU7H6MFkc6iTISTas6oe2wgaMzHXDvVGLn:EoFPoJ3Su0lEpGiexs6asFPw2zvVe
Malware Config
Signatures
-
SaintBot payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2660-13-0x0000000000400000-0x000000000040C000-memory.dmp family_saintbot behavioral1/memory/2660-15-0x0000000000400000-0x000000000040C000-memory.dmp family_saintbot behavioral1/memory/2660-17-0x0000000000400000-0x000000000040C000-memory.dmp family_saintbot behavioral1/memory/2660-21-0x0000000000400000-0x000000000040C000-memory.dmp family_saintbot behavioral1/memory/2660-23-0x0000000000400000-0x000000000040C000-memory.dmp family_saintbot behavioral1/memory/2660-41-0x0000000000400000-0x000000000040C000-memory.dmp family_saintbot -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2532 cmd.exe -
Drops startup file 1 IoCs
Processes:
5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Outlook MUI (English) 2010.exe 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe -
Executes dropped EXE 2 IoCs
Processes:
Microsoft Office Outlook MUI (English) 2010.exeMicrosoft Office Outlook MUI (English) 2010.exepid process 2680 Microsoft Office Outlook MUI (English) 2010.exe 2352 Microsoft Office Outlook MUI (English) 2010.exe -
Loads dropped DLL 8 IoCs
Processes:
5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exeWerFault.exepid process 2660 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exeMicrosoft Office Outlook MUI (English) 2010.exedescription pid process target process PID 2112 set thread context of 2660 2112 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe PID 2680 set thread context of 2352 2680 Microsoft Office Outlook MUI (English) 2010.exe Microsoft Office Outlook MUI (English) 2010.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1960 2352 WerFault.exe Microsoft Office Outlook MUI (English) 2010.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.execmd.exeMicrosoft Office Outlook MUI (English) 2010.exeMicrosoft Office Outlook MUI (English) 2010.exedescription pid process target process PID 2112 wrote to memory of 2660 2112 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe PID 2112 wrote to memory of 2660 2112 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe PID 2112 wrote to memory of 2660 2112 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe PID 2112 wrote to memory of 2660 2112 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe PID 2112 wrote to memory of 2660 2112 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe PID 2112 wrote to memory of 2660 2112 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe PID 2112 wrote to memory of 2660 2112 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe PID 2112 wrote to memory of 2660 2112 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe PID 2112 wrote to memory of 2660 2112 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe PID 2112 wrote to memory of 2660 2112 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe PID 2112 wrote to memory of 2660 2112 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe PID 2660 wrote to memory of 2680 2660 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2660 wrote to memory of 2680 2660 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2660 wrote to memory of 2680 2660 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2660 wrote to memory of 2680 2660 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2660 wrote to memory of 2532 2660 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe cmd.exe PID 2660 wrote to memory of 2532 2660 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe cmd.exe PID 2660 wrote to memory of 2532 2660 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe cmd.exe PID 2660 wrote to memory of 2532 2660 5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe cmd.exe PID 2532 wrote to memory of 2928 2532 cmd.exe PING.EXE PID 2532 wrote to memory of 2928 2532 cmd.exe PING.EXE PID 2532 wrote to memory of 2928 2532 cmd.exe PING.EXE PID 2532 wrote to memory of 2928 2532 cmd.exe PING.EXE PID 2532 wrote to memory of 2760 2532 cmd.exe cmd.exe PID 2532 wrote to memory of 2760 2532 cmd.exe cmd.exe PID 2532 wrote to memory of 2760 2532 cmd.exe cmd.exe PID 2532 wrote to memory of 2760 2532 cmd.exe cmd.exe PID 2680 wrote to memory of 2352 2680 Microsoft Office Outlook MUI (English) 2010.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2680 wrote to memory of 2352 2680 Microsoft Office Outlook MUI (English) 2010.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2680 wrote to memory of 2352 2680 Microsoft Office Outlook MUI (English) 2010.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2680 wrote to memory of 2352 2680 Microsoft Office Outlook MUI (English) 2010.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2680 wrote to memory of 2352 2680 Microsoft Office Outlook MUI (English) 2010.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2680 wrote to memory of 2352 2680 Microsoft Office Outlook MUI (English) 2010.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2680 wrote to memory of 2352 2680 Microsoft Office Outlook MUI (English) 2010.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2680 wrote to memory of 2352 2680 Microsoft Office Outlook MUI (English) 2010.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2680 wrote to memory of 2352 2680 Microsoft Office Outlook MUI (English) 2010.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2680 wrote to memory of 2352 2680 Microsoft Office Outlook MUI (English) 2010.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2680 wrote to memory of 2352 2680 Microsoft Office Outlook MUI (English) 2010.exe Microsoft Office Outlook MUI (English) 2010.exe PID 2352 wrote to memory of 1960 2352 Microsoft Office Outlook MUI (English) 2010.exe WerFault.exe PID 2352 wrote to memory of 1960 2352 Microsoft Office Outlook MUI (English) 2010.exe WerFault.exe PID 2352 wrote to memory of 1960 2352 Microsoft Office Outlook MUI (English) 2010.exe WerFault.exe PID 2352 wrote to memory of 1960 2352 Microsoft Office Outlook MUI (English) 2010.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe"C:\Users\Admin\AppData\Local\Temp\5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13.exe"{path}"2⤵
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Outlook MUI (English) 2010.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Outlook MUI (English) 2010.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Outlook MUI (English) 2010.exe"{path}"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 885⤵
- Loads dropped DLL
- Program crash
PID:1960
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\del.bat3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 34⤵
- Runs ping.exe
PID:2928
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"4⤵PID:2760
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170B
MD56628993c2dba6dd9ca73b7b74133932c
SHA1a07fdeeab34d4d7cd9f4c090732c7379094c86a7
SHA256d4aba441d68a6ee6a6def87ddfe87854b23979eae3bd45328fb920e3b75ec3ca
SHA512eb5ef06dc5bf08befdcbbbf2034eaf41e02ba44f2ed692acec76b9e8caab7466c2438156846030c58bbbf0427bc052529fb2522fdd2e0a9e19f4e31503cc9d94
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Outlook MUI (English) 2010.exe
Filesize501KB
MD5a7913461e211158d5ac34ac3bd06bc7b
SHA171c3f7a9eac34b0b5ccd5ec2df01f9c95f14235b
SHA2565fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13
SHA5128107feec4426f820d3910e35d6e3c1a1aa85a104231a0529f7fcd825f2dfec10fbf856bc2b37c585a34f5d03b514ece7f54b600add6fb668cda0c7d1a7374e04