Analysis
-
max time kernel
109s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 14:32
Static task
static1
Behavioral task
behavioral1
Sample
e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe
Resource
win7-20240221-en
General
-
Target
e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe
-
Size
224KB
-
MD5
e65e7ca60642f80fe2a95823247f8726
-
SHA1
fc0700076fd443edb24777e4ee7eed802411fd70
-
SHA256
e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2
-
SHA512
ddbeb67894fa3b847dbaf34d3e2fce5d383baabd6cfef9c1a2ec15ebe59ae922f9cbd711f83acddd05455919bc462863cc0e52bd1982195260487e45ef198f1a
-
SSDEEP
3072:rDXO3PV+Al8gnrlowLLjY/LWxJi9G4d4As3duOs5n53qN6Z5YR2Ot:oV+AltnrawLLWWQG4d4NF3N6EHt
Malware Config
Signatures
-
SaintBot payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/4960-2-0x0000000002D10000-0x0000000002D19000-memory.dmp family_saintbot behavioral2/memory/4960-3-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral2/memory/4960-19-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral2/memory/4960-20-0x0000000002D10000-0x0000000002D19000-memory.dmp family_saintbot behavioral2/memory/1852-23-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral2/memory/1852-26-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral2/memory/1288-27-0x0000000000B90000-0x0000000000B9B000-memory.dmp family_saintbot behavioral2/memory/1852-28-0x0000000000400000-0x0000000002BA9000-memory.dmp family_saintbot behavioral2/memory/1288-30-0x0000000000B90000-0x0000000000B9B000-memory.dmp family_saintbot behavioral2/memory/1288-31-0x0000000000B90000-0x0000000000B9B000-memory.dmp family_saintbot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe -
Drops startup file 2 IoCs
Processes:
Microsoft Edge.exee0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe Microsoft Edge.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe -
Executes dropped EXE 1 IoCs
Processes:
Microsoft Edge.exepid Process 1852 Microsoft Edge.exe -
Loads dropped DLL 2 IoCs
Processes:
Microsoft Edge.exeEhStorAuthn.exepid Process 1852 Microsoft Edge.exe 1288 EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
EhStorAuthn.exee0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exeMicrosoft Edge.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum Microsoft Edge.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Microsoft Edge.exe -
Drops file in System32 directory 1 IoCs
Processes:
EhStorAuthn.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 1776 4960 WerFault.exe 92 4024 1852 WerFault.exe 100 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EhStorAuthn.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Microsoft Edge.exepid Process 1852 Microsoft Edge.exe 1852 Microsoft Edge.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.execmd.exeMicrosoft Edge.exeEhStorAuthn.exedescription pid Process procid_target PID 4960 wrote to memory of 1852 4960 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe 100 PID 4960 wrote to memory of 1852 4960 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe 100 PID 4960 wrote to memory of 1852 4960 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe 100 PID 4960 wrote to memory of 1552 4960 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe 101 PID 4960 wrote to memory of 1552 4960 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe 101 PID 4960 wrote to memory of 1552 4960 e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe 101 PID 1552 wrote to memory of 864 1552 cmd.exe 105 PID 1552 wrote to memory of 864 1552 cmd.exe 105 PID 1552 wrote to memory of 864 1552 cmd.exe 105 PID 1552 wrote to memory of 3824 1552 cmd.exe 108 PID 1552 wrote to memory of 3824 1552 cmd.exe 108 PID 1552 wrote to memory of 3824 1552 cmd.exe 108 PID 1852 wrote to memory of 1288 1852 Microsoft Edge.exe 110 PID 1852 wrote to memory of 1288 1852 Microsoft Edge.exe 110 PID 1852 wrote to memory of 1288 1852 Microsoft Edge.exe 110 PID 1852 wrote to memory of 1288 1852 Microsoft Edge.exe 110 PID 1288 wrote to memory of 5064 1288 EhStorAuthn.exe 113 PID 1288 wrote to memory of 5064 1288 EhStorAuthn.exe 113 PID 1288 wrote to memory of 5064 1288 EhStorAuthn.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe"C:\Users\Admin\AppData\Local\Temp\e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2.exe"1⤵
- Checks computer location settings
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"3⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Maintenance" /tr "C:\Users\%USERNAME%\AppData\Local\z_%USERNAME%\%USERNAME%.vbs" /F4⤵
- Creates scheduled task(s)
PID:5064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 6483⤵
- Program crash
PID:4024
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:864
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"3⤵PID:3824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 11402⤵
- Program crash
PID:1776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4960 -ip 49601⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1852 -ip 18521⤵PID:2672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=2972,i,4036376905309803364,5412922217215781933,262144 --variations-seed-version /prefetch:81⤵PID:5020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
224KB
MD5e65e7ca60642f80fe2a95823247f8726
SHA1fc0700076fd443edb24777e4ee7eed802411fd70
SHA256e0c46e23bd1b5b96123e0c64914484bbfae7a7ad13cbd45184035d4c0f8a10a2
SHA512ddbeb67894fa3b847dbaf34d3e2fce5d383baabd6cfef9c1a2ec15ebe59ae922f9cbd711f83acddd05455919bc462863cc0e52bd1982195260487e45ef198f1a
-
Filesize
170B
MD53910b0eb607801b025ac40fcfe4532be
SHA1de6eafeb09c09c3ebe268379c1c2e3d0aa22ba96
SHA256ba281851ed10d0e5b5675bd82480cf2ac6b764178ecca7a6da5c910afc27df07
SHA5129a00854a8544570f2dac1573f02b88cc2b24962fc33f718f0b17b5c5fcee1e5d834cc9d7777bf3dc71abff0dabe8abe753053446d49d0cac9a63f492f545cdd5