Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 14:46
Static task
static1
Behavioral task
behavioral1
Sample
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
Resource
win10v2004-20231215-en
General
-
Target
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe
-
Size
235KB
-
MD5
247951ff7b519fa8d39ef07d33e0ba5b
-
SHA1
cf4587b6015d2a00c26a369339504595a266401f
-
SHA256
ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03
-
SHA512
6185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7
-
SSDEEP
3072:ZIWl+L9yTYPc4cW/QgB3JibTVLHvFKF4uzYiP0c21srymY5rc:ZI/L9GYp/xB49vFKGuzYiP0c8q0
Malware Config
Signatures
-
SaintBot payload 9 IoCs
resource yara_rule behavioral1/memory/2272-2-0x0000000000220000-0x0000000000229000-memory.dmp family_saintbot behavioral1/memory/2272-3-0x0000000000400000-0x0000000000A14000-memory.dmp family_saintbot behavioral1/memory/2272-23-0x0000000000400000-0x0000000000A14000-memory.dmp family_saintbot behavioral1/memory/2756-27-0x0000000000400000-0x0000000000A14000-memory.dmp family_saintbot behavioral1/memory/2756-31-0x0000000000400000-0x0000000000A14000-memory.dmp family_saintbot behavioral1/memory/2568-33-0x0000000000080000-0x000000000008B000-memory.dmp family_saintbot behavioral1/memory/2568-35-0x0000000000080000-0x000000000008B000-memory.dmp family_saintbot behavioral1/memory/2756-36-0x0000000000400000-0x0000000000A14000-memory.dmp family_saintbot behavioral1/memory/2568-37-0x0000000000080000-0x000000000008B000-memory.dmp family_saintbot -
Deletes itself 1 IoCs
pid Process 2560 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\53609.exe ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\53609.exe 53609.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 53609.exe -
Loads dropped DLL 4 IoCs
pid Process 2272 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 2272 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 2756 53609.exe 2568 EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 53609.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 53609.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2508 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2724 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2756 53609.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2756 2272 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 28 PID 2272 wrote to memory of 2756 2272 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 28 PID 2272 wrote to memory of 2756 2272 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 28 PID 2272 wrote to memory of 2756 2272 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 28 PID 2272 wrote to memory of 2560 2272 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 29 PID 2272 wrote to memory of 2560 2272 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 29 PID 2272 wrote to memory of 2560 2272 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 29 PID 2272 wrote to memory of 2560 2272 ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe 29 PID 2560 wrote to memory of 2724 2560 cmd.exe 31 PID 2560 wrote to memory of 2724 2560 cmd.exe 31 PID 2560 wrote to memory of 2724 2560 cmd.exe 31 PID 2560 wrote to memory of 2724 2560 cmd.exe 31 PID 2560 wrote to memory of 2592 2560 cmd.exe 32 PID 2560 wrote to memory of 2592 2560 cmd.exe 32 PID 2560 wrote to memory of 2592 2560 cmd.exe 32 PID 2560 wrote to memory of 2592 2560 cmd.exe 32 PID 2756 wrote to memory of 2568 2756 53609.exe 33 PID 2756 wrote to memory of 2568 2756 53609.exe 33 PID 2756 wrote to memory of 2568 2756 53609.exe 33 PID 2756 wrote to memory of 2568 2756 53609.exe 33 PID 2756 wrote to memory of 2568 2756 53609.exe 33 PID 2568 wrote to memory of 2508 2568 EhStorAuthn.exe 34 PID 2568 wrote to memory of 2508 2568 EhStorAuthn.exe 34 PID 2568 wrote to memory of 2508 2568 EhStorAuthn.exe 34 PID 2568 wrote to memory of 2508 2568 EhStorAuthn.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe"C:\Users\Admin\AppData\Local\Temp\ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\53609.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\53609.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:2508
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:2724
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
170B
MD59b1143ff58ed5cb62d5217076eaf0964
SHA1f67b957fbfd107aeaed1f48733e13c3dc7d6b1af
SHA2565e2151e781bf9cf36e4fc6a6d13d4686fa6375edfbe7143b1a3a40e0a4415556
SHA5127f63336f33ea624a04984855b8d9e541a75c18dea067b92d153a79750c23716743e112f198dc65ba2ca1ddc5a7ad7bb5eb0076de54fbdba27862592b16cbc095
-
Filesize
235KB
MD5247951ff7b519fa8d39ef07d33e0ba5b
SHA1cf4587b6015d2a00c26a369339504595a266401f
SHA256ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03
SHA5126185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7