Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 13:11
Behavioral task
behavioral1
Sample
a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe
Resource
win7-20240221-en
General
-
Target
a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe
-
Size
29KB
-
MD5
d2efb0b8b82576016416aacbde6c3873
-
SHA1
19cac454edb76d7e879598d8c7e8e032f9d006d2
-
SHA256
a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969
-
SHA512
e05172a8e7b0988ecfd85833177727262448bc9730dd0b33bae2b311d95336a97399824635f2ef4a6374fe04eb46f3739f4a6cce4a46b0c04df88a915d5b2c94
-
SSDEEP
768:HOMiz6RkiNkf8DnpdGMXMmCp3gzr9b3j3zIXwrn:smCiE89dGM6pwzFF
Malware Config
Signatures
-
SaintBot payload 4 IoCs
resource yara_rule behavioral1/files/0x0029000000015c52-5.dat family_saintbot behavioral1/memory/2536-20-0x0000000000080000-0x000000000008C000-memory.dmp family_saintbot behavioral1/memory/2536-22-0x0000000000080000-0x000000000008C000-memory.dmp family_saintbot behavioral1/memory/2536-23-0x0000000000080000-0x000000000008C000-memory.dmp family_saintbot -
Deletes itself 1 IoCs
pid Process 2956 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Proofing (English) 2010.exe a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Proofing (English) 2010.exe Microsoft Office Proofing (English) 2010.exe -
Executes dropped EXE 1 IoCs
pid Process 3036 Microsoft Office Proofing (English) 2010.exe -
Loads dropped DLL 3 IoCs
pid Process 1708 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 3036 Microsoft Office Proofing (English) 2010.exe 2536 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum Microsoft Office Proofing (English) 2010.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Microsoft Office Proofing (English) 2010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2420 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2524 PING.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1708 wrote to memory of 3036 1708 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 28 PID 1708 wrote to memory of 3036 1708 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 28 PID 1708 wrote to memory of 3036 1708 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 28 PID 1708 wrote to memory of 3036 1708 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 28 PID 1708 wrote to memory of 2956 1708 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 29 PID 1708 wrote to memory of 2956 1708 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 29 PID 1708 wrote to memory of 2956 1708 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 29 PID 1708 wrote to memory of 2956 1708 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 29 PID 2956 wrote to memory of 2524 2956 cmd.exe 31 PID 2956 wrote to memory of 2524 2956 cmd.exe 31 PID 2956 wrote to memory of 2524 2956 cmd.exe 31 PID 2956 wrote to memory of 2524 2956 cmd.exe 31 PID 2956 wrote to memory of 2596 2956 cmd.exe 32 PID 2956 wrote to memory of 2596 2956 cmd.exe 32 PID 2956 wrote to memory of 2596 2956 cmd.exe 32 PID 2956 wrote to memory of 2596 2956 cmd.exe 32 PID 3036 wrote to memory of 2536 3036 Microsoft Office Proofing (English) 2010.exe 33 PID 3036 wrote to memory of 2536 3036 Microsoft Office Proofing (English) 2010.exe 33 PID 3036 wrote to memory of 2536 3036 Microsoft Office Proofing (English) 2010.exe 33 PID 3036 wrote to memory of 2536 3036 Microsoft Office Proofing (English) 2010.exe 33 PID 3036 wrote to memory of 2536 3036 Microsoft Office Proofing (English) 2010.exe 33 PID 2536 wrote to memory of 2420 2536 EhStorAuthn.exe 34 PID 2536 wrote to memory of 2420 2536 EhStorAuthn.exe 34 PID 2536 wrote to memory of 2420 2536 EhStorAuthn.exe 34 PID 2536 wrote to memory of 2420 2536 EhStorAuthn.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe"C:\Users\Admin\AppData\Local\Temp\a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Proofing (English) 2010.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Proofing (English) 2010.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:2420
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:2524
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
170B
MD57fe762e20099ac6263f73e9802371684
SHA1caee8a6e500edaa047451fee1a748c0cb02a04da
SHA256eb1049f972679d763edd03252cbad0cc801021ca5eabe897c9cfd0142fee26a4
SHA512eac2d0e01c18e33e6405bd76518ac1357f1040300dd9b575f84193c66aa6f152f97d8adc0598f99e0c15e418007bba4dcc2a4c54ab8b96a7c530670f3e0e6b22
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office Proofing (English) 2010.exe
Filesize29KB
MD5d2efb0b8b82576016416aacbde6c3873
SHA119cac454edb76d7e879598d8c7e8e032f9d006d2
SHA256a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969
SHA512e05172a8e7b0988ecfd85833177727262448bc9730dd0b33bae2b311d95336a97399824635f2ef4a6374fe04eb46f3739f4a6cce4a46b0c04df88a915d5b2c94