Analysis
-
max time kernel
136s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 14:43
Static task
static1
Behavioral task
behavioral1
Sample
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe
Resource
win10v2004-20240226-en
General
-
Target
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe
-
Size
30KB
-
MD5
ab2a92e0fc5a6f63336e442f34089f16
-
SHA1
24f71409bde9d01e3519236e66f3452236302e46
-
SHA256
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c
-
SHA512
50a7e2d4454bd3914cf55fe188f920e08b895c16b9eee498aea2cb71944caf3a3c1266d3b73046179412fd996dfaf48f03fdb39d5662310aa7859faa29d7970e
-
SSDEEP
768:I9PbKQ0paZvZFH5v5D8umAuHr+EGsmHDHh7ow8JEW9fkG5Qrhb9wF/nACkh8o2:UPbQcZvZFtBGLKDB7o/o2
Malware Config
Signatures
-
SaintBot payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3984-16-0x0000000000130000-0x000000000013B000-memory.dmp family_saintbot behavioral2/memory/3984-18-0x0000000000130000-0x000000000013B000-memory.dmp family_saintbot behavioral2/memory/3984-19-0x0000000000130000-0x000000000013B000-memory.dmp family_saintbot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe -
Drops startup file 2 IoCs
Processes:
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe51011.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\51011.exe e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\51011.exe 51011.exe -
Executes dropped EXE 1 IoCs
Processes:
51011.exepid process 2256 51011.exe -
Loads dropped DLL 2 IoCs
Processes:
51011.exedfrgui.exepid process 2256 51011.exe 3984 dfrgui.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
dfrgui.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\zzAdmin\\Admin.vbs" dfrgui.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe51011.exedfrgui.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\start /b "" cmd /c del "%~f0"&exit /b e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 51011.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\start /b "" cmd /c del "%~f0"&exit /b 51011.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum dfrgui.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\start /b "" cmd /c del "%~f0"&exit /b dfrgui.exe -
Drops file in System32 directory 1 IoCs
Processes:
dfrgui.exedescription ioc process File opened for modification C:\Windows\SysWOW64\dfrgui.exe dfrgui.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dfrgui.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dfrgui.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dfrgui.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
51011.exepid process 2256 51011.exe 2256 51011.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe51011.execmd.exedfrgui.exedescription pid process target process PID 3960 wrote to memory of 2256 3960 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe 51011.exe PID 3960 wrote to memory of 2256 3960 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe 51011.exe PID 3960 wrote to memory of 2256 3960 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe 51011.exe PID 3960 wrote to memory of 4052 3960 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe cmd.exe PID 3960 wrote to memory of 4052 3960 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe cmd.exe PID 3960 wrote to memory of 4052 3960 e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe cmd.exe PID 2256 wrote to memory of 3984 2256 51011.exe dfrgui.exe PID 2256 wrote to memory of 3984 2256 51011.exe dfrgui.exe PID 2256 wrote to memory of 3984 2256 51011.exe dfrgui.exe PID 4052 wrote to memory of 1072 4052 cmd.exe PING.EXE PID 4052 wrote to memory of 1072 4052 cmd.exe PING.EXE PID 4052 wrote to memory of 1072 4052 cmd.exe PING.EXE PID 2256 wrote to memory of 3984 2256 51011.exe dfrgui.exe PID 4052 wrote to memory of 5100 4052 cmd.exe cmd.exe PID 4052 wrote to memory of 5100 4052 cmd.exe cmd.exe PID 4052 wrote to memory of 5100 4052 cmd.exe cmd.exe PID 3984 wrote to memory of 232 3984 dfrgui.exe schtasks.exe PID 3984 wrote to memory of 232 3984 dfrgui.exe schtasks.exe PID 3984 wrote to memory of 232 3984 dfrgui.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe"C:\Users\Admin\AppData\Local\Temp\e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c.exe"1⤵
- Checks computer location settings
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\51011.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\51011.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\dfrgui.exe"C:\Windows\system32\dfrgui.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Update" /tr "%SYSTEMDRIVE%\Users\%USERNAME%\AppData\Local\zz%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:232
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:1072
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:5100
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
30KB
MD5ab2a92e0fc5a6f63336e442f34089f16
SHA124f71409bde9d01e3519236e66f3452236302e46
SHA256e8207e8c31a8613112223d126d4f12e7a5f8caf4acaaf40834302ce49f37cc9c
SHA51250a7e2d4454bd3914cf55fe188f920e08b895c16b9eee498aea2cb71944caf3a3c1266d3b73046179412fd996dfaf48f03fdb39d5662310aa7859faa29d7970e
-
Filesize
169B
MD51693d297bdc94f2cb18c8a5d2ef2e095
SHA17a3b9d25c9947ce464f27d80c490e2c444f9d288
SHA2564dd249adcdf2c6dd61f8ad96712f1f125e6c7875874b4790bef1c257a0cb1203
SHA5120983020c73d8251d150c50ec0d03c96e07bb0d6701ae21bdd47a50b6ebdd115a7d8671100c18c1a33019f84598381e6a6895419aa9d6374924bf0583d816919a