Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe
Resource
win7-20231129-en
General
-
Target
9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe
-
Size
293KB
-
MD5
572fdac6723a4031febc449795f51df5
-
SHA1
fdf8662e68a5dfc900cec85fa509ac392471e856
-
SHA256
9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69
-
SHA512
c62563eda61cafd5705f6f2fadbf0fc0a79837d1811305403ea774eddda6617bf0853c0f9b2d96dcd8ae5ae3d27a913b17939bd3b09784a07e236e7ef8a61888
-
SSDEEP
6144:SQ9vt04i5QLALxkRXAPmgNbCkq+lsbrfyLC:SaO4i5lFwAPmgN2nRram
Malware Config
Signatures
-
SaintBot payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/1072-2-0x0000000000020000-0x0000000000029000-memory.dmp family_saintbot behavioral1/memory/1072-3-0x0000000000400000-0x0000000001783000-memory.dmp family_saintbot behavioral1/memory/1072-23-0x0000000000400000-0x0000000001783000-memory.dmp family_saintbot behavioral1/memory/1992-27-0x0000000000400000-0x0000000001783000-memory.dmp family_saintbot behavioral1/memory/1992-31-0x0000000000400000-0x0000000001783000-memory.dmp family_saintbot behavioral1/memory/2604-33-0x0000000000080000-0x000000000008B000-memory.dmp family_saintbot behavioral1/memory/2604-35-0x0000000000080000-0x000000000008B000-memory.dmp family_saintbot behavioral1/memory/2604-36-0x0000000000080000-0x000000000008B000-memory.dmp family_saintbot -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1472 cmd.exe -
Drops startup file 2 IoCs
Processes:
9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe26553.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\26553.exe 9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\26553.exe 26553.exe -
Executes dropped EXE 1 IoCs
Processes:
26553.exepid process 1992 26553.exe -
Loads dropped DLL 4 IoCs
Processes:
9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe26553.exeEhStorAuthn.exepid process 1072 9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe 1072 9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe 1992 26553.exe 2604 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
EhStorAuthn.exe9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe26553.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 26553.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 26553.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe -
Drops file in System32 directory 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EhStorAuthn.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
26553.exepid process 1992 26553.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.execmd.exe26553.exeEhStorAuthn.exedescription pid process target process PID 1072 wrote to memory of 1992 1072 9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe 26553.exe PID 1072 wrote to memory of 1992 1072 9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe 26553.exe PID 1072 wrote to memory of 1992 1072 9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe 26553.exe PID 1072 wrote to memory of 1992 1072 9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe 26553.exe PID 1072 wrote to memory of 1472 1072 9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe cmd.exe PID 1072 wrote to memory of 1472 1072 9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe cmd.exe PID 1072 wrote to memory of 1472 1072 9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe cmd.exe PID 1072 wrote to memory of 1472 1072 9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe cmd.exe PID 1472 wrote to memory of 2588 1472 cmd.exe PING.EXE PID 1472 wrote to memory of 2588 1472 cmd.exe PING.EXE PID 1472 wrote to memory of 2588 1472 cmd.exe PING.EXE PID 1472 wrote to memory of 2588 1472 cmd.exe PING.EXE PID 1472 wrote to memory of 2740 1472 cmd.exe cmd.exe PID 1472 wrote to memory of 2740 1472 cmd.exe cmd.exe PID 1472 wrote to memory of 2740 1472 cmd.exe cmd.exe PID 1472 wrote to memory of 2740 1472 cmd.exe cmd.exe PID 1992 wrote to memory of 2604 1992 26553.exe EhStorAuthn.exe PID 1992 wrote to memory of 2604 1992 26553.exe EhStorAuthn.exe PID 1992 wrote to memory of 2604 1992 26553.exe EhStorAuthn.exe PID 1992 wrote to memory of 2604 1992 26553.exe EhStorAuthn.exe PID 1992 wrote to memory of 2604 1992 26553.exe EhStorAuthn.exe PID 2604 wrote to memory of 2736 2604 EhStorAuthn.exe schtasks.exe PID 2604 wrote to memory of 2736 2604 EhStorAuthn.exe schtasks.exe PID 2604 wrote to memory of 2736 2604 EhStorAuthn.exe schtasks.exe PID 2604 wrote to memory of 2736 2604 EhStorAuthn.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe"C:\Users\Admin\AppData\Local\Temp\9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\26553.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\26553.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:2736
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:2588
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
170B
MD5fb48e940116e69dd07134e67397628a4
SHA1bf3f0520a8e605e4cfb433c553d4a02a3f782458
SHA256b68d4309791178d90aa1be2aa1919699f372d6fe959f7d012509b35f096a3455
SHA51229358cec8c7ad7b4f8dc7e4ca56c2a58f566e7508561f6f07c290ced0c09fa3d0702d1223045719986a1ef724231da8b9ce656dcb38ebe5362b6d26437256120
-
Filesize
293KB
MD5572fdac6723a4031febc449795f51df5
SHA1fdf8662e68a5dfc900cec85fa509ac392471e856
SHA2569cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69
SHA512c62563eda61cafd5705f6f2fadbf0fc0a79837d1811305403ea774eddda6617bf0853c0f9b2d96dcd8ae5ae3d27a913b17939bd3b09784a07e236e7ef8a61888