Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 12:59
Static task
static1
Behavioral task
behavioral1
Sample
9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe
Resource
win7-20231129-en
General
-
Target
9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe
-
Size
234KB
-
MD5
23f5b5fcd6f181088af23614bf6e015f
-
SHA1
edba6f00b0b697b59ce958c01f8c62bfac51b021
-
SHA256
9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34
-
SHA512
b5923d60b654c69088525dc08d5f11c1fa5465d4f567af95b993d41eceb82976c6b4c137342aaaed0f67ba5a04f0dd5b74622d612bc97a92006a813923b2f901
-
SSDEEP
3072:EIWl+LyyTYPc4cW/QgB3JibTVLHvFKFsC6snEQ8Zq0b2AIr8mY5:EI/LyGYp/xB49vFKcsnJ8Zq0b7m
Malware Config
Signatures
-
SaintBot payload 8 IoCs
resource yara_rule behavioral1/memory/2088-2-0x00000000001B0000-0x00000000001B9000-memory.dmp family_saintbot behavioral1/memory/2088-3-0x0000000000400000-0x0000000000A14000-memory.dmp family_saintbot behavioral1/memory/2088-23-0x0000000000400000-0x0000000000A14000-memory.dmp family_saintbot behavioral1/memory/2948-27-0x0000000000400000-0x0000000000A14000-memory.dmp family_saintbot behavioral1/memory/2948-31-0x0000000000400000-0x0000000000A14000-memory.dmp family_saintbot behavioral1/memory/2752-33-0x00000000000C0000-0x00000000000CB000-memory.dmp family_saintbot behavioral1/memory/2752-35-0x00000000000C0000-0x00000000000CB000-memory.dmp family_saintbot behavioral1/memory/2752-36-0x00000000000C0000-0x00000000000CB000-memory.dmp family_saintbot -
Deletes itself 1 IoCs
pid Process 2836 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Proof (Spanish) 2010.exe 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Proof (Spanish) 2010.exe Microsoft Office Proof (Spanish) 2010.exe -
Executes dropped EXE 1 IoCs
pid Process 2948 Microsoft Office Proof (Spanish) 2010.exe -
Loads dropped DLL 4 IoCs
pid Process 2088 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 2088 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 2948 Microsoft Office Proof (Spanish) 2010.exe 2752 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum Microsoft Office Proof (Spanish) 2010.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Microsoft Office Proof (Spanish) 2010.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2448 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2592 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2948 Microsoft Office Proof (Spanish) 2010.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2948 2088 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 28 PID 2088 wrote to memory of 2948 2088 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 28 PID 2088 wrote to memory of 2948 2088 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 28 PID 2088 wrote to memory of 2948 2088 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 28 PID 2088 wrote to memory of 2836 2088 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 29 PID 2088 wrote to memory of 2836 2088 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 29 PID 2088 wrote to memory of 2836 2088 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 29 PID 2088 wrote to memory of 2836 2088 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 29 PID 2836 wrote to memory of 2592 2836 cmd.exe 31 PID 2836 wrote to memory of 2592 2836 cmd.exe 31 PID 2836 wrote to memory of 2592 2836 cmd.exe 31 PID 2836 wrote to memory of 2592 2836 cmd.exe 31 PID 2836 wrote to memory of 2232 2836 cmd.exe 32 PID 2836 wrote to memory of 2232 2836 cmd.exe 32 PID 2836 wrote to memory of 2232 2836 cmd.exe 32 PID 2836 wrote to memory of 2232 2836 cmd.exe 32 PID 2948 wrote to memory of 2752 2948 Microsoft Office Proof (Spanish) 2010.exe 33 PID 2948 wrote to memory of 2752 2948 Microsoft Office Proof (Spanish) 2010.exe 33 PID 2948 wrote to memory of 2752 2948 Microsoft Office Proof (Spanish) 2010.exe 33 PID 2948 wrote to memory of 2752 2948 Microsoft Office Proof (Spanish) 2010.exe 33 PID 2948 wrote to memory of 2752 2948 Microsoft Office Proof (Spanish) 2010.exe 33 PID 2752 wrote to memory of 2448 2752 EhStorAuthn.exe 34 PID 2752 wrote to memory of 2448 2752 EhStorAuthn.exe 34 PID 2752 wrote to memory of 2448 2752 EhStorAuthn.exe 34 PID 2752 wrote to memory of 2448 2752 EhStorAuthn.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe"C:\Users\Admin\AppData\Local\Temp\9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Proof (Spanish) 2010.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Proof (Spanish) 2010.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:2448
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:2592
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:2232
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
170B
MD57214daf11f3bb3daf22f81e448ae8bfe
SHA1b819d839f52dfe6b61e03aaf3b2de55d3e5f10c1
SHA2560487da2735d154be7e023c963756dae07e7ff7a78e7a5578ee592cda41935029
SHA512f61ad0bd84db7199d7bc4e0ade52c647cecb1b789ebaa4089e11cba02d0169486c983278ae626eb17f11eea405dfbf88b22a0e9aea4a3ecd6beb28bd7e127d65
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Proof (Spanish) 2010.exe
Filesize234KB
MD523f5b5fcd6f181088af23614bf6e015f
SHA1edba6f00b0b697b59ce958c01f8c62bfac51b021
SHA2569ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34
SHA512b5923d60b654c69088525dc08d5f11c1fa5465d4f567af95b993d41eceb82976c6b4c137342aaaed0f67ba5a04f0dd5b74622d612bc97a92006a813923b2f901