Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 14:43
Static task
static1
Behavioral task
behavioral1
Sample
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe
Resource
win10v2004-20240226-en
General
-
Target
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe
-
Size
30KB
-
MD5
ab2a92e0fc5a6f63336e442f34089f16
-
SHA1
24f71409bde9d01e3519236e66f3452236302e46
-
SHA256
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c
-
SHA512
50a7e2d4454bd3914cf55fe188f920e08b895c16b9eee498aea2cb71944caf3a3c1266d3b73046179412fd996dfaf48f03fdb39d5662310aa7859faa29d7970e
-
SSDEEP
768:I9PbKQ0paZvZFH5v5D8umAuHr+EGsmHDHh7ow8JEW9fkG5Qrhb9wF/nACkh8o2:UPbQcZvZFtBGLKDB7o/o2
Malware Config
Signatures
-
SaintBot payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2060-20-0x00000000000C0000-0x00000000000CB000-memory.dmp family_saintbot behavioral1/memory/2060-22-0x00000000000C0000-0x00000000000CB000-memory.dmp family_saintbot behavioral1/memory/2060-23-0x00000000000C0000-0x00000000000CB000-memory.dmp family_saintbot -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 3060 cmd.exe -
Drops startup file 2 IoCs
Processes:
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe48505.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\48505.exe e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\48505.exe 48505.exe -
Executes dropped EXE 1 IoCs
Processes:
48505.exepid process 1996 48505.exe -
Loads dropped DLL 3 IoCs
Processes:
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe48505.exedfrgui.exepid process 1904 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe 1996 48505.exe 2060 dfrgui.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
dfrgui.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\zzAdmin\\Admin.vbs" dfrgui.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
48505.exedfrgui.exee8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 48505.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\start /b "" cmd /c del "%~f0"&exit /b 48505.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum dfrgui.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\start /b "" cmd /c del "%~f0"&exit /b dfrgui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\start /b "" cmd /c del "%~f0"&exit /b e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe -
Drops file in System32 directory 1 IoCs
Processes:
dfrgui.exedescription ioc process File opened for modification C:\Windows\SysWOW64\dfrgui.exe dfrgui.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dfrgui.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dfrgui.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dfrgui.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
48505.exepid process 1996 48505.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe48505.execmd.exedfrgui.exedescription pid process target process PID 1904 wrote to memory of 1996 1904 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe 48505.exe PID 1904 wrote to memory of 1996 1904 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe 48505.exe PID 1904 wrote to memory of 1996 1904 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe 48505.exe PID 1904 wrote to memory of 1996 1904 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe 48505.exe PID 1904 wrote to memory of 3060 1904 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe cmd.exe PID 1904 wrote to memory of 3060 1904 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe cmd.exe PID 1904 wrote to memory of 3060 1904 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe cmd.exe PID 1904 wrote to memory of 3060 1904 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe cmd.exe PID 1996 wrote to memory of 2060 1996 48505.exe dfrgui.exe PID 1996 wrote to memory of 2060 1996 48505.exe dfrgui.exe PID 1996 wrote to memory of 2060 1996 48505.exe dfrgui.exe PID 1996 wrote to memory of 2060 1996 48505.exe dfrgui.exe PID 3060 wrote to memory of 2984 3060 cmd.exe PING.EXE PID 3060 wrote to memory of 2984 3060 cmd.exe PING.EXE PID 3060 wrote to memory of 2984 3060 cmd.exe PING.EXE PID 3060 wrote to memory of 2984 3060 cmd.exe PING.EXE PID 1996 wrote to memory of 2060 1996 48505.exe dfrgui.exe PID 3060 wrote to memory of 2672 3060 cmd.exe cmd.exe PID 3060 wrote to memory of 2672 3060 cmd.exe cmd.exe PID 3060 wrote to memory of 2672 3060 cmd.exe cmd.exe PID 3060 wrote to memory of 2672 3060 cmd.exe cmd.exe PID 2060 wrote to memory of 2716 2060 dfrgui.exe schtasks.exe PID 2060 wrote to memory of 2716 2060 dfrgui.exe schtasks.exe PID 2060 wrote to memory of 2716 2060 dfrgui.exe schtasks.exe PID 2060 wrote to memory of 2716 2060 dfrgui.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe"C:\Users\Admin\AppData\Local\Temp\e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\48505.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\48505.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\dfrgui.exe"C:\Windows\system32\dfrgui.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Update" /tr "%SYSTEMDRIVE%\Users\%USERNAME%\AppData\Local\zz%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:2716
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:2984
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
169B
MD51693d297bdc94f2cb18c8a5d2ef2e095
SHA17a3b9d25c9947ce464f27d80c490e2c444f9d288
SHA2564dd249adcdf2c6dd61f8ad96712f1f125e6c7875874b4790bef1c257a0cb1203
SHA5120983020c73d8251d150c50ec0d03c96e07bb0d6701ae21bdd47a50b6ebdd115a7d8671100c18c1a33019f84598381e6a6895419aa9d6374924bf0583d816919a
-
Filesize
30KB
MD5ab2a92e0fc5a6f63336e442f34089f16
SHA124f71409bde9d01e3519236e66f3452236302e46
SHA256e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c
SHA51250a7e2d4454bd3914cf55fe188f920e08b895c16b9eee498aea2cb71944caf3a3c1266d3b73046179412fd996dfaf48f03fdb39d5662310aa7859faa29d7970e