Analysis
-
max time kernel
115s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 13:11
Behavioral task
behavioral1
Sample
a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe
Resource
win7-20240221-en
General
-
Target
a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe
-
Size
29KB
-
MD5
d2efb0b8b82576016416aacbde6c3873
-
SHA1
19cac454edb76d7e879598d8c7e8e032f9d006d2
-
SHA256
a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969
-
SHA512
e05172a8e7b0988ecfd85833177727262448bc9730dd0b33bae2b311d95336a97399824635f2ef4a6374fe04eb46f3739f4a6cce4a46b0c04df88a915d5b2c94
-
SSDEEP
768:HOMiz6RkiNkf8DnpdGMXMmCp3gzr9b3j3zIXwrn:smCiE89dGM6pwzFF
Malware Config
Signatures
-
SaintBot payload 4 IoCs
resource yara_rule behavioral2/files/0x000c0000000230f8-7.dat family_saintbot behavioral2/memory/2452-16-0x0000000000120000-0x000000000012C000-memory.dmp family_saintbot behavioral2/memory/2452-18-0x0000000000120000-0x000000000012C000-memory.dmp family_saintbot behavioral2/memory/2452-19-0x0000000000120000-0x000000000012C000-memory.dmp family_saintbot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\14761.exe a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\14761.exe 14761.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 14761.exe -
Loads dropped DLL 2 IoCs
pid Process 2736 14761.exe 2452 EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 14761.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 14761.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4576 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2328 PING.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3704 wrote to memory of 2736 3704 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 100 PID 3704 wrote to memory of 2736 3704 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 100 PID 3704 wrote to memory of 2736 3704 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 100 PID 3704 wrote to memory of 4276 3704 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 101 PID 3704 wrote to memory of 4276 3704 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 101 PID 3704 wrote to memory of 4276 3704 a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe 101 PID 4276 wrote to memory of 2328 4276 cmd.exe 104 PID 4276 wrote to memory of 2328 4276 cmd.exe 104 PID 4276 wrote to memory of 2328 4276 cmd.exe 104 PID 4276 wrote to memory of 3576 4276 cmd.exe 105 PID 4276 wrote to memory of 3576 4276 cmd.exe 105 PID 4276 wrote to memory of 3576 4276 cmd.exe 105 PID 2736 wrote to memory of 2452 2736 14761.exe 109 PID 2736 wrote to memory of 2452 2736 14761.exe 109 PID 2736 wrote to memory of 2452 2736 14761.exe 109 PID 2736 wrote to memory of 2452 2736 14761.exe 109 PID 2452 wrote to memory of 4576 2452 EhStorAuthn.exe 110 PID 2452 wrote to memory of 4576 2452 EhStorAuthn.exe 110 PID 2452 wrote to memory of 4576 2452 EhStorAuthn.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe"C:\Users\Admin\AppData\Local\Temp\a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969.exe"1⤵
- Checks computer location settings
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\14761.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\14761.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:4576
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:2328
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:3576
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4176 --field-trial-handle=2264,i,13734085038406049477,12426093271221802693,262144 --variations-seed-version /prefetch:81⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
29KB
MD5d2efb0b8b82576016416aacbde6c3873
SHA119cac454edb76d7e879598d8c7e8e032f9d006d2
SHA256a4b705baac8bb2c0d2bc111eae9735fb8586d6d1dab050f3c89fb12589470969
SHA512e05172a8e7b0988ecfd85833177727262448bc9730dd0b33bae2b311d95336a97399824635f2ef4a6374fe04eb46f3739f4a6cce4a46b0c04df88a915d5b2c94
-
Filesize
170B
MD57fe762e20099ac6263f73e9802371684
SHA1caee8a6e500edaa047451fee1a748c0cb02a04da
SHA256eb1049f972679d763edd03252cbad0cc801021ca5eabe897c9cfd0142fee26a4
SHA512eac2d0e01c18e33e6405bd76518ac1357f1040300dd9b575f84193c66aa6f152f97d8adc0598f99e0c15e418007bba4dcc2a4c54ab8b96a7c530670f3e0e6b22