Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 14:32
Static task
static1
Behavioral task
behavioral1
Sample
e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe
Resource
win7-20240221-en
General
-
Target
e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe
-
Size
224KB
-
MD5
e65e7ca60642f80fe2a95823247f8726
-
SHA1
fc0700076fd443edb24777e4ee7eed802411fd70
-
SHA256
e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2
-
SHA512
ddbeb67894fa3b847dbaf34d3e2fce5d383baabd6cfef9c1a2ec15ebe59ae922f9cbd711f83acddd05455919bc462863cc0e52bd1982195260487e45ef198f1a
-
SSDEEP
3072:rDXO3PV+Al8gnrlowLLjY/LWxJi9G4d4As3duOs5n53qN6Z5YR2Ot:oV+AltnrawLLWWQG4d4NF3N6EHt
Malware Config
Signatures
-
SaintBot payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/1548-2-0x0000000000220000-0x0000000000229000-memory.dmp family_saintbot behavioral1/memory/1548-3-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral1/memory/1548-23-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral1/memory/2548-27-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral1/memory/2548-31-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral1/memory/2472-33-0x0000000000080000-0x000000000008B000-memory.dmp family_saintbot behavioral1/memory/2472-35-0x0000000000080000-0x000000000008B000-memory.dmp family_saintbot behavioral1/memory/2472-36-0x0000000000080000-0x000000000008B000-memory.dmp family_saintbot -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2524 cmd.exe -
Drops startup file 2 IoCs
Processes:
e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe54623.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\54623.exe e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\54623.exe 54623.exe -
Executes dropped EXE 1 IoCs
Processes:
54623.exepid process 2548 54623.exe -
Loads dropped DLL 4 IoCs
Processes:
e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe54623.exeEhStorAuthn.exepid process 1548 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe 1548 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe 2548 54623.exe 2472 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
EhStorAuthn.exee0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe54623.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 54623.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 54623.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe -
Drops file in System32 directory 1 IoCs
Processes:
EhStorAuthn.exedescription ioc process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EhStorAuthn.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
54623.exepid process 2548 54623.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.execmd.exe54623.exeEhStorAuthn.exedescription pid process target process PID 1548 wrote to memory of 2548 1548 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe 54623.exe PID 1548 wrote to memory of 2548 1548 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe 54623.exe PID 1548 wrote to memory of 2548 1548 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe 54623.exe PID 1548 wrote to memory of 2548 1548 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe 54623.exe PID 1548 wrote to memory of 2524 1548 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe cmd.exe PID 1548 wrote to memory of 2524 1548 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe cmd.exe PID 1548 wrote to memory of 2524 1548 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe cmd.exe PID 1548 wrote to memory of 2524 1548 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe cmd.exe PID 2524 wrote to memory of 2768 2524 cmd.exe PING.EXE PID 2524 wrote to memory of 2768 2524 cmd.exe PING.EXE PID 2524 wrote to memory of 2768 2524 cmd.exe PING.EXE PID 2524 wrote to memory of 2768 2524 cmd.exe PING.EXE PID 2524 wrote to memory of 2592 2524 cmd.exe cmd.exe PID 2524 wrote to memory of 2592 2524 cmd.exe cmd.exe PID 2524 wrote to memory of 2592 2524 cmd.exe cmd.exe PID 2524 wrote to memory of 2592 2524 cmd.exe cmd.exe PID 2548 wrote to memory of 2472 2548 54623.exe EhStorAuthn.exe PID 2548 wrote to memory of 2472 2548 54623.exe EhStorAuthn.exe PID 2548 wrote to memory of 2472 2548 54623.exe EhStorAuthn.exe PID 2548 wrote to memory of 2472 2548 54623.exe EhStorAuthn.exe PID 2548 wrote to memory of 2472 2548 54623.exe EhStorAuthn.exe PID 2472 wrote to memory of 1352 2472 EhStorAuthn.exe schtasks.exe PID 2472 wrote to memory of 1352 2472 EhStorAuthn.exe schtasks.exe PID 2472 wrote to memory of 1352 2472 EhStorAuthn.exe schtasks.exe PID 2472 wrote to memory of 1352 2472 EhStorAuthn.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe"C:\Users\Admin\AppData\Local\Temp\e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\54623.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\54623.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:1352
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:2768
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170B
MD53910b0eb607801b025ac40fcfe4532be
SHA1de6eafeb09c09c3ebe268379c1c2e3d0aa22ba96
SHA256ba281851ed10d0e5b5675bd82480cf2ac6b764178ecca7a6da5c910afc27df07
SHA5129a00854a8544570f2dac1573f02b88cc2b24962fc33f718f0b17b5c5fcee1e5d834cc9d7777bf3dc71abff0dabe8abe753053446d49d0cac9a63f492f545cdd5
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
224KB
MD5e65e7ca60642f80fe2a95823247f8726
SHA1fc0700076fd443edb24777e4ee7eed802411fd70
SHA256e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2
SHA512ddbeb67894fa3b847dbaf34d3e2fce5d383baabd6cfef9c1a2ec15ebe59ae922f9cbd711f83acddd05455919bc462863cc0e52bd1982195260487e45ef198f1a