Analysis
-
max time kernel
114s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe
Resource
win7-20240319-en
General
-
Target
c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe
-
Size
224KB
-
MD5
9ae3d8ba1311af690523aeb2e69bb469
-
SHA1
1357dbf294817122b1e193762fb3d66a5d73e651
-
SHA256
c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a
-
SHA512
039c76556071c1d1e86fd344f671a6ff76eea067a18b8b90d9cb1c6334bd63e64a9bf19846daf2f1e5006b331f641d65162d946c85ee0e37c510ac52c5973f61
-
SSDEEP
3072:swA6vA1Cs1gm6LL0hX+t4cD1/JiwiX9nyntWyj5KLHXd6Buo3:i1Csam6LohX+t1yX9nMm3dpo
Malware Config
Signatures
-
SaintBot payload 12 IoCs
resource yara_rule behavioral2/memory/1568-2-0x0000000002E50000-0x0000000002E59000-memory.dmp family_saintbot behavioral2/memory/1568-3-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral2/memory/1568-4-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral2/memory/4812-20-0x0000000002EA0000-0x0000000002FA0000-memory.dmp family_saintbot behavioral2/memory/4812-21-0x0000000002CC0000-0x0000000002CC9000-memory.dmp family_saintbot behavioral2/memory/4812-22-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral2/memory/1568-23-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral2/memory/4812-26-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral2/memory/4812-29-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral2/memory/4372-30-0x0000000000E60000-0x0000000000E6B000-memory.dmp family_saintbot behavioral2/memory/4372-34-0x0000000000E60000-0x0000000000E6B000-memory.dmp family_saintbot behavioral2/memory/4372-35-0x0000000000E60000-0x0000000000E6B000-memory.dmp family_saintbot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\29594.exe c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\29594.exe 29594.exe -
Executes dropped EXE 1 IoCs
pid Process 4812 29594.exe -
Loads dropped DLL 2 IoCs
pid Process 4812 29594.exe 4372 EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 29594.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 29594.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1492 1568 WerFault.exe 90 3936 4812 WerFault.exe 94 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 348 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3284 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4812 29594.exe 4812 29594.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1568 wrote to memory of 4812 1568 c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe 94 PID 1568 wrote to memory of 4812 1568 c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe 94 PID 1568 wrote to memory of 4812 1568 c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe 94 PID 1568 wrote to memory of 4532 1568 c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe 95 PID 1568 wrote to memory of 4532 1568 c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe 95 PID 1568 wrote to memory of 4532 1568 c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe 95 PID 4532 wrote to memory of 3284 4532 cmd.exe 99 PID 4532 wrote to memory of 3284 4532 cmd.exe 99 PID 4532 wrote to memory of 3284 4532 cmd.exe 99 PID 4532 wrote to memory of 4408 4532 cmd.exe 101 PID 4532 wrote to memory of 4408 4532 cmd.exe 101 PID 4532 wrote to memory of 4408 4532 cmd.exe 101 PID 4812 wrote to memory of 4372 4812 29594.exe 107 PID 4812 wrote to memory of 4372 4812 29594.exe 107 PID 4812 wrote to memory of 4372 4812 29594.exe 107 PID 4812 wrote to memory of 4372 4812 29594.exe 107 PID 4372 wrote to memory of 348 4372 EhStorAuthn.exe 113 PID 4372 wrote to memory of 348 4372 EhStorAuthn.exe 113 PID 4372 wrote to memory of 348 4372 EhStorAuthn.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe"C:\Users\Admin\AppData\Local\Temp\c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a.exe"1⤵
- Checks computer location settings
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\29594.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\29594.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:348
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 6163⤵
- Program crash
PID:3936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:3284
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:4408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 7962⤵
- Program crash
PID:1492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1568 -ip 15681⤵PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4812 -ip 48121⤵PID:2484
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3988 --field-trial-handle=2256,i,18272763564106695635,11201593968620719822,262144 --variations-seed-version /prefetch:81⤵PID:1104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
224KB
MD59ae3d8ba1311af690523aeb2e69bb469
SHA11357dbf294817122b1e193762fb3d66a5d73e651
SHA256c33a905e513005cee9071ed10933b8e6a11be2335755660e3f7b2adf554f704a
SHA512039c76556071c1d1e86fd344f671a6ff76eea067a18b8b90d9cb1c6334bd63e64a9bf19846daf2f1e5006b331f641d65162d946c85ee0e37c510ac52c5973f61
-
Filesize
170B
MD50ebcfb3a61bb857a39f579a83208200b
SHA1f6382065a69a8a53e0c27ed640707ebdf1bc93b4
SHA256571e6efcdbc6bd8a64945982408a38d17c55ac780b58620487b919615edc3a09
SHA512fc5eebcbe88c90d34eb4f124b33351a6d172d62a30ee692447f6d0b8ec9d0a62cca03db6c748bf8e95a5e05c8ec478127d1ac6423df807cb0a2183351912243b