Analysis
-
max time kernel
93s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 12:59
Static task
static1
Behavioral task
behavioral1
Sample
9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe
Resource
win7-20231129-en
General
-
Target
9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe
-
Size
234KB
-
MD5
23f5b5fcd6f181088af23614bf6e015f
-
SHA1
edba6f00b0b697b59ce958c01f8c62bfac51b021
-
SHA256
9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34
-
SHA512
b5923d60b654c69088525dc08d5f11c1fa5465d4f567af95b993d41eceb82976c6b4c137342aaaed0f67ba5a04f0dd5b74622d612bc97a92006a813923b2f901
-
SSDEEP
3072:EIWl+LyyTYPc4cW/QgB3JibTVLHvFKFsC6snEQ8Zq0b2AIr8mY5:EI/LyGYp/xB49vFKcsnJ8Zq0b7m
Malware Config
Signatures
-
SaintBot payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/1420-3-0x0000000002760000-0x0000000002769000-memory.dmp family_saintbot behavioral2/memory/1420-2-0x0000000000400000-0x0000000000A14000-memory.dmp family_saintbot behavioral2/memory/2548-23-0x0000000000400000-0x0000000000A14000-memory.dmp family_saintbot behavioral2/memory/1420-24-0x0000000000400000-0x0000000000A14000-memory.dmp family_saintbot behavioral2/memory/2548-27-0x0000000000400000-0x0000000000A14000-memory.dmp family_saintbot behavioral2/memory/1760-28-0x00000000007C0000-0x00000000007CB000-memory.dmp family_saintbot behavioral2/memory/1760-31-0x00000000007C0000-0x00000000007CB000-memory.dmp family_saintbot behavioral2/memory/1760-32-0x00000000007C0000-0x00000000007CB000-memory.dmp family_saintbot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe -
Drops startup file 2 IoCs
Processes:
9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe13922.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\13922.exe 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\13922.exe 13922.exe -
Executes dropped EXE 1 IoCs
Processes:
13922.exepid process 2548 13922.exe -
Loads dropped DLL 2 IoCs
Processes:
13922.exeEhStorAuthn.exepid process 2548 13922.exe 1760 EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe13922.exeEhStorAuthn.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 13922.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 13922.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 EhStorAuthn.exe -
Drops file in System32 directory 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3996 1420 WerFault.exe 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 708 2548 WerFault.exe 13922.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EhStorAuthn.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
13922.exepid process 2548 13922.exe 2548 13922.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.execmd.exe13922.exeEhStorAuthn.exedescription pid process target process PID 1420 wrote to memory of 2548 1420 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 13922.exe PID 1420 wrote to memory of 2548 1420 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 13922.exe PID 1420 wrote to memory of 2548 1420 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe 13922.exe PID 1420 wrote to memory of 2156 1420 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe cmd.exe PID 1420 wrote to memory of 2156 1420 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe cmd.exe PID 1420 wrote to memory of 2156 1420 9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe cmd.exe PID 2156 wrote to memory of 2480 2156 cmd.exe PING.EXE PID 2156 wrote to memory of 2480 2156 cmd.exe PING.EXE PID 2156 wrote to memory of 2480 2156 cmd.exe PING.EXE PID 2156 wrote to memory of 436 2156 cmd.exe cmd.exe PID 2156 wrote to memory of 436 2156 cmd.exe cmd.exe PID 2156 wrote to memory of 436 2156 cmd.exe cmd.exe PID 2548 wrote to memory of 1760 2548 13922.exe EhStorAuthn.exe PID 2548 wrote to memory of 1760 2548 13922.exe EhStorAuthn.exe PID 2548 wrote to memory of 1760 2548 13922.exe EhStorAuthn.exe PID 2548 wrote to memory of 1760 2548 13922.exe EhStorAuthn.exe PID 1760 wrote to memory of 3948 1760 EhStorAuthn.exe schtasks.exe PID 1760 wrote to memory of 3948 1760 EhStorAuthn.exe schtasks.exe PID 1760 wrote to memory of 3948 1760 EhStorAuthn.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe"C:\Users\Admin\AppData\Local\Temp\9ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34.exe"1⤵
- Checks computer location settings
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\13922.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\13922.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:3948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 6163⤵
- Program crash
PID:708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:2480
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 12402⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1420 -ip 14201⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2548 -ip 25481⤵PID:3700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
234KB
MD523f5b5fcd6f181088af23614bf6e015f
SHA1edba6f00b0b697b59ce958c01f8c62bfac51b021
SHA2569ec80626504ca869f5e731aef720e446936333aaf6ab32bae03c0de3c2299f34
SHA512b5923d60b654c69088525dc08d5f11c1fa5465d4f567af95b993d41eceb82976c6b4c137342aaaed0f67ba5a04f0dd5b74622d612bc97a92006a813923b2f901
-
Filesize
170B
MD57214daf11f3bb3daf22f81e448ae8bfe
SHA1b819d839f52dfe6b61e03aaf3b2de55d3e5f10c1
SHA2560487da2735d154be7e023c963756dae07e7ff7a78e7a5578ee592cda41935029
SHA512f61ad0bd84db7199d7bc4e0ade52c647cecb1b789ebaa4089e11cba02d0169486c983278ae626eb17f11eea405dfbf88b22a0e9aea4a3ecd6beb28bd7e127d65