Resubmissions
09-08-2024 18:10
240809-wsd7vatdpq 1009-08-2024 18:06
240809-wpp5yaxdpa 1009-08-2024 13:45
240809-q2hzhavera 10Analysis
-
max time kernel
59s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 18:06
General
-
Target
SaturnTempSpoofer.exe
-
Size
181KB
-
MD5
0380311e496051295f02a440d4f34308
-
SHA1
d2b2d91ced3d0526fcb13f310bb5f7be4844b346
-
SHA256
ab0f362333e655da8332ba89226f9ac0c90e31aa53e633097cf6f88aead1a389
-
SHA512
b95a20df94c311deb080d45e1bcd7cd3f79e449041acd52bc67423adb50f49ec9e4728838f96aaec0f67d1fb9cb7403be0e445db06928434f49baac565be600e
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDalQlzw+jqZ91UbTK4I:UsLqdufVUNDaRW491Ub8
Malware Config
Extracted
xenorat
73.131.36.77
Saturn Temp Spoofer
-
install_path
appdata
-
port
4782
-
startup_name
AppWindows.exe
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 9 IoCs
pid Process 3496 saturntempspoofer.exe 1704 icsys.icn.exe 5088 explorer.exe 4464 spoolsv.exe 5044 svchost.exe 3736 spoolsv.exe 4236 saturntempspoofer.exe 3604 icsys.icn.exe 1700 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe SaturnTempSpoofer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe SaturnTempSpoofer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SaturnTempSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SaturnTempSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language saturntempspoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SaturnTempSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language saturntempspoofer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4224 schtasks.exe 3476 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 1704 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5088 explorer.exe 5044 svchost.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 2376 SaturnTempSpoofer.exe 2376 SaturnTempSpoofer.exe 1704 icsys.icn.exe 1704 icsys.icn.exe 5088 explorer.exe 5088 explorer.exe 4464 spoolsv.exe 4464 spoolsv.exe 5044 svchost.exe 5044 svchost.exe 3736 spoolsv.exe 3736 spoolsv.exe 4504 SaturnTempSpoofer.exe 4504 SaturnTempSpoofer.exe 4504 SaturnTempSpoofer.exe 2908 SaturnTempSpoofer.exe 2908 SaturnTempSpoofer.exe 2908 SaturnTempSpoofer.exe 3604 icsys.icn.exe 3604 icsys.icn.exe 3604 icsys.icn.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3496 2376 SaturnTempSpoofer.exe 86 PID 2376 wrote to memory of 3496 2376 SaturnTempSpoofer.exe 86 PID 2376 wrote to memory of 3496 2376 SaturnTempSpoofer.exe 86 PID 2376 wrote to memory of 1704 2376 SaturnTempSpoofer.exe 89 PID 2376 wrote to memory of 1704 2376 SaturnTempSpoofer.exe 89 PID 2376 wrote to memory of 1704 2376 SaturnTempSpoofer.exe 89 PID 3496 wrote to memory of 4224 3496 saturntempspoofer.exe 90 PID 3496 wrote to memory of 4224 3496 saturntempspoofer.exe 90 PID 3496 wrote to memory of 4224 3496 saturntempspoofer.exe 90 PID 1704 wrote to memory of 5088 1704 icsys.icn.exe 92 PID 1704 wrote to memory of 5088 1704 icsys.icn.exe 92 PID 1704 wrote to memory of 5088 1704 icsys.icn.exe 92 PID 5088 wrote to memory of 4464 5088 explorer.exe 93 PID 5088 wrote to memory of 4464 5088 explorer.exe 93 PID 5088 wrote to memory of 4464 5088 explorer.exe 93 PID 4464 wrote to memory of 5044 4464 spoolsv.exe 95 PID 4464 wrote to memory of 5044 4464 spoolsv.exe 95 PID 4464 wrote to memory of 5044 4464 spoolsv.exe 95 PID 5044 wrote to memory of 3736 5044 svchost.exe 96 PID 5044 wrote to memory of 3736 5044 svchost.exe 96 PID 5044 wrote to memory of 3736 5044 svchost.exe 96 PID 4504 wrote to memory of 4236 4504 SaturnTempSpoofer.exe 110 PID 4504 wrote to memory of 4236 4504 SaturnTempSpoofer.exe 110 PID 4504 wrote to memory of 4236 4504 SaturnTempSpoofer.exe 110 PID 4236 wrote to memory of 3476 4236 saturntempspoofer.exe 111 PID 4236 wrote to memory of 3476 4236 saturntempspoofer.exe 111 PID 4236 wrote to memory of 3476 4236 saturntempspoofer.exe 111 PID 4504 wrote to memory of 3604 4504 SaturnTempSpoofer.exe 114 PID 4504 wrote to memory of 3604 4504 SaturnTempSpoofer.exe 114 PID 4504 wrote to memory of 3604 4504 SaturnTempSpoofer.exe 114 PID 3604 wrote to memory of 1700 3604 icsys.icn.exe 115 PID 3604 wrote to memory of 1700 3604 icsys.icn.exe 115 PID 3604 wrote to memory of 1700 3604 icsys.icn.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\SaturnTempSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\SaturnTempSpoofer.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
\??\c:\users\admin\appdata\local\temp\saturntempspoofer.exec:\users\admin\appdata\local\temp\saturntempspoofer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "AppWindows.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCA64.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4224
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5088 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4464 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3736
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\SaturnTempSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\SaturnTempSpoofer.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
\??\c:\users\admin\appdata\local\temp\saturntempspoofer.exec:\users\admin\appdata\local\temp\saturntempspoofer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "AppWindows.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp63C6.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3476
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3604 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1700
-
-
-
C:\Users\Admin\AppData\Local\Temp\SaturnTempSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\SaturnTempSpoofer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2908
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5601c4ed7cdaa8a844937fe5fd62a8aff
SHA15ad9cf4a98cff0711ef7c0ca68353161d026a783
SHA256c1d9b0e2b4967ddeace94b452b8db110137d165c4725d3ab61ec0a8b44f27765
SHA51217d9b61107f327da1baed79779b834e669ecc4c38515e7334cc3424d9e773966937de09dc364111af37013fcdd3b00a3cd0cfcc2950db2bb61797ee1704cd477
-
Filesize
1KB
MD54a6533ac35b34ba35ea7fe0a37192a66
SHA129d3cbd1d4b9542175c17d6d4f20a5d992ae4c01
SHA256b4eff105fd062397dd2931dd5b138323a3c7d05c9e4f630cf51a24949eb2bacb
SHA512a356c1d8a46679a9fc2c3a14615d98c3fb4c00ac908b8f44c99a9070cb32d00c3b3eeb1700152f12a78924de79adc2de8452432e647fe0ed46baf1e065451d3d
-
Filesize
135KB
MD57c85cb1015c7a5af8a43bf600d466dac
SHA186d04cd26537407a4f4f3047e2c5665c223bbb8f
SHA2567c9f7023465a07c88af0533ff124355142e3cb242dd6c8c72fda9ae8597e40cd
SHA512b15b2e15e91325284ab9cf826e205877a9b6c73cf4ca8e8d7d4dc505e4b5b280758a06822468591af6324854d4fe19c0ba71217f7098f0f63e5c7170bedf9486
-
Filesize
135KB
MD5d6d054e7390aa12da74bd9dfaf246917
SHA162d73f8b9b0cae264d2036204c4c6b05f4fa88d2
SHA256b89f7426b1d3c5293ff6d0d51f5673c4e670f15d47463461785daec6e3e98903
SHA51266e4dedd18ad17a9df47dc553937a7048177bf439b682dddb7dcc847e48fdbd00b1e280fd9c5448fc03569c610e104e803dccd5fc0eecc2a140a298ea95f45c2
-
Filesize
135KB
MD57fbb46fa4c50320b98d2d29354b388cc
SHA12ec667beb04a5f5542b2aa97c2d0170153bbc55e
SHA2568184f0e58f29d4a7f10e1555f45f7e4f38a6c177aecc719fee35720164daa68c
SHA5128f7fb13c19af86c15a5d729a0b02e10d22b11784a5505e4261a75aba7e16d4fa6d15ddc2e8a4bede1d94a7e23c6fdb9d8a0cfe97ea96ac8d8a9e9de424bfc8af
-
Filesize
135KB
MD56e66851488ac99b5903b0d703a15b62a
SHA13ffc8baea87eaa92afabcac666215bb99d6773af
SHA256e24d49903ac23312e7f1b7a9aa907b061879c8849b3a52a0d2acfed3ae381cb8
SHA5125b43865545ecd18a999146d3f58eba5b7e44f24e3477bac146e50340784c3dc35841c1622bf12b23d54fcff87a20e7f860b0ceb6e238991b7807eb13326e0676