Analysis

  • max time kernel
    93s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 12:57

General

  • Target

    9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe

  • Size

    293KB

  • MD5

    572fdac6723a4031febc449795f51df5

  • SHA1

    fdf8662e68a5dfc900cec85fa509ac392471e856

  • SHA256

    9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69

  • SHA512

    c62563eda61cafd5705f6f2fadbf0fc0a79837d1811305403ea774eddda6617bf0853c0f9b2d96dcd8ae5ae3d27a913b17939bd3b09784a07e236e7ef8a61888

  • SSDEEP

    6144:SQ9vt04i5QLALxkRXAPmgNbCkq+lsbrfyLC:SaO4i5lFwAPmgN2nRram

Malware Config

Signatures

  • SaintBot

    Saint Bot is a malware dropper being used to deliver secondary payloads such as information stealers.

  • SaintBot payload 8 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe
    "C:\Users\Admin\AppData\Local\Temp\9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Maps connected drives based on registry
    • Suspicious use of WriteProcessMemory
    PID:4688
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\23902.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\23902.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Maps connected drives based on registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3872
      • C:\Windows\SysWOW64\EhStorAuthn.exe
        "C:\Windows\System32\EhStorAuthn.exe"
        3⤵
        • Loads dropped DLL
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:372
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F
          4⤵
          • Creates scheduled task(s)
          PID:972
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 616
        3⤵
        • Program crash
        PID:3424
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\SysWOW64\PING.EXE
        ping localhost -n 3
        3⤵
        • Runs ping.exe
        PID:4444
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"
        3⤵
          PID:4136
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 792
        2⤵
        • Program crash
        PID:2892
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4688 -ip 4688
      1⤵
        PID:4748
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3872 -ip 3872
        1⤵
          PID:4520

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\z_Admin\wallpaper.mp4

          Filesize

          1.6MB

          MD5

          4f3387277ccbd6d1f21ac5c07fe4ca68

          SHA1

          e16506f662dc92023bf82def1d621497c8ab5890

          SHA256

          767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

          SHA512

          9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\23902.exe

          Filesize

          293KB

          MD5

          572fdac6723a4031febc449795f51df5

          SHA1

          fdf8662e68a5dfc900cec85fa509ac392471e856

          SHA256

          9cf4b83688dd5035623182d6a895c61e1e71ea02dc3e474111810f6641df1d69

          SHA512

          c62563eda61cafd5705f6f2fadbf0fc0a79837d1811305403ea774eddda6617bf0853c0f9b2d96dcd8ae5ae3d27a913b17939bd3b09784a07e236e7ef8a61888

        • C:\Users\Admin\AppData\Roaming\del.bat

          Filesize

          170B

          MD5

          fb48e940116e69dd07134e67397628a4

          SHA1

          bf3f0520a8e605e4cfb433c553d4a02a3f782458

          SHA256

          b68d4309791178d90aa1be2aa1919699f372d6fe959f7d012509b35f096a3455

          SHA512

          29358cec8c7ad7b4f8dc7e4ca56c2a58f566e7508561f6f07c290ced0c09fa3d0702d1223045719986a1ef724231da8b9ce656dcb38ebe5362b6d26437256120

        • memory/372-32-0x0000000000FA0000-0x0000000000FAB000-memory.dmp

          Filesize

          44KB

        • memory/372-31-0x0000000000FA0000-0x0000000000FAB000-memory.dmp

          Filesize

          44KB

        • memory/372-28-0x0000000000FA0000-0x0000000000FAB000-memory.dmp

          Filesize

          44KB

        • memory/3872-23-0x0000000000400000-0x0000000001783000-memory.dmp

          Filesize

          19.5MB

        • memory/3872-27-0x0000000000400000-0x0000000001783000-memory.dmp

          Filesize

          19.5MB

        • memory/3872-22-0x0000000001A90000-0x0000000001B90000-memory.dmp

          Filesize

          1024KB

        • memory/4688-24-0x0000000000400000-0x0000000001783000-memory.dmp

          Filesize

          19.5MB

        • memory/4688-1-0x00000000019F0000-0x0000000001AF0000-memory.dmp

          Filesize

          1024KB

        • memory/4688-3-0x0000000000400000-0x0000000001783000-memory.dmp

          Filesize

          19.5MB

        • memory/4688-2-0x0000000001860000-0x0000000001869000-memory.dmp

          Filesize

          36KB