Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 13:32
Static task
static1
Behavioral task
behavioral1
Sample
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe
Resource
win7-20240221-en
General
-
Target
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe
-
Size
269KB
-
MD5
e640bdb76d7b30cb9ca9250d5b6631e3
-
SHA1
0540792efa9eb7ecdcfce3340dc0be1204c1e8c8
-
SHA256
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42
-
SHA512
0d9bbc8f82a212cbb92595f2d5e7e4e1bab00061286f04441dce4c383827e3d55a60afee4e1d52b2af4ded201c5c54c046a4065ca055cfa1448b807a4a4a2034
-
SSDEEP
3072:HWFdp+IajKk//6uu3icJ3QJiLK4DBOigIjbeirMnUMdE5R+l:2FdpH4KVd3bneIjbekMn9
Malware Config
Signatures
-
SaintBot payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/1548-2-0x0000000000020000-0x0000000000029000-memory.dmp family_saintbot behavioral1/memory/1548-3-0x0000000000400000-0x000000000177D000-memory.dmp family_saintbot behavioral1/memory/1548-24-0x0000000000020000-0x0000000000029000-memory.dmp family_saintbot behavioral1/memory/1548-23-0x0000000000400000-0x000000000177D000-memory.dmp family_saintbot behavioral1/memory/2548-28-0x0000000000400000-0x000000000177D000-memory.dmp family_saintbot behavioral1/memory/2548-32-0x0000000000400000-0x000000000177D000-memory.dmp family_saintbot behavioral1/memory/2436-34-0x0000000000080000-0x000000000008C000-memory.dmp family_saintbot behavioral1/memory/2436-36-0x0000000000080000-0x000000000008C000-memory.dmp family_saintbot behavioral1/memory/2436-37-0x0000000000080000-0x000000000008C000-memory.dmp family_saintbot -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2524 cmd.exe -
Drops startup file 2 IoCs
Processes:
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe44656.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\44656.exe b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\44656.exe 44656.exe -
Executes dropped EXE 1 IoCs
Processes:
44656.exepid process 2548 44656.exe -
Loads dropped DLL 4 IoCs
Processes:
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe44656.exeEhStorAuthn.exepid process 1548 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 1548 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 2548 44656.exe 2436 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
EhStorAuthn.exeb1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe44656.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 44656.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 44656.exe -
Drops file in System32 directory 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EhStorAuthn.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.execmd.exe44656.exeEhStorAuthn.exedescription pid process target process PID 1548 wrote to memory of 2548 1548 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 44656.exe PID 1548 wrote to memory of 2548 1548 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 44656.exe PID 1548 wrote to memory of 2548 1548 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 44656.exe PID 1548 wrote to memory of 2548 1548 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe 44656.exe PID 1548 wrote to memory of 2524 1548 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe cmd.exe PID 1548 wrote to memory of 2524 1548 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe cmd.exe PID 1548 wrote to memory of 2524 1548 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe cmd.exe PID 1548 wrote to memory of 2524 1548 b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe cmd.exe PID 2524 wrote to memory of 2104 2524 cmd.exe PING.EXE PID 2524 wrote to memory of 2104 2524 cmd.exe PING.EXE PID 2524 wrote to memory of 2104 2524 cmd.exe PING.EXE PID 2524 wrote to memory of 2104 2524 cmd.exe PING.EXE PID 2524 wrote to memory of 2704 2524 cmd.exe cmd.exe PID 2524 wrote to memory of 2704 2524 cmd.exe cmd.exe PID 2524 wrote to memory of 2704 2524 cmd.exe cmd.exe PID 2524 wrote to memory of 2704 2524 cmd.exe cmd.exe PID 2548 wrote to memory of 2436 2548 44656.exe EhStorAuthn.exe PID 2548 wrote to memory of 2436 2548 44656.exe EhStorAuthn.exe PID 2548 wrote to memory of 2436 2548 44656.exe EhStorAuthn.exe PID 2548 wrote to memory of 2436 2548 44656.exe EhStorAuthn.exe PID 2548 wrote to memory of 2436 2548 44656.exe EhStorAuthn.exe PID 2436 wrote to memory of 2100 2436 EhStorAuthn.exe schtasks.exe PID 2436 wrote to memory of 2100 2436 EhStorAuthn.exe schtasks.exe PID 2436 wrote to memory of 2100 2436 EhStorAuthn.exe schtasks.exe PID 2436 wrote to memory of 2100 2436 EhStorAuthn.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe"C:\Users\Admin\AppData\Local\Temp\b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\44656.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\44656.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:2100
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:2104
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170B
MD5a4e647734e5d81ca311fb08c0dcd18cb
SHA1b87f1e31d58a07f60c903927720825a92a3840b5
SHA256ea8621af8832071483084f0ddb156ab7eb7349d14ec03d3d08b881cb941a1143
SHA51226514370f3fb5c99b1e0c986ba9ec1387536e7b010025d3dd479d390c4662f9d722c0ed243b8b902bcd3b882e8a2f7102e9b93dcff2f5cbb5a8c54c59660f006
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
269KB
MD5e640bdb76d7b30cb9ca9250d5b6631e3
SHA10540792efa9eb7ecdcfce3340dc0be1204c1e8c8
SHA256b1af67bcfaa99c369960580f86e7c1a42fc473dd85a0a4d3b1c989a6bc138a42
SHA5120d9bbc8f82a212cbb92595f2d5e7e4e1bab00061286f04441dce4c383827e3d55a60afee4e1d52b2af4ded201c5c54c046a4065ca055cfa1448b807a4a4a2034