Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 18:07
Behavioral task
behavioral1
Sample
SaturnTempSpoofer.exe
Resource
win7-20240708-en
General
-
Target
SaturnTempSpoofer.exe
-
Size
181KB
-
MD5
0380311e496051295f02a440d4f34308
-
SHA1
d2b2d91ced3d0526fcb13f310bb5f7be4844b346
-
SHA256
ab0f362333e655da8332ba89226f9ac0c90e31aa53e633097cf6f88aead1a389
-
SHA512
b95a20df94c311deb080d45e1bcd7cd3f79e449041acd52bc67423adb50f49ec9e4728838f96aaec0f67d1fb9cb7403be0e445db06928434f49baac565be600e
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDalQlzw+jqZ91UbTK4I:UsLqdufVUNDaRW491Ub8
Malware Config
Extracted
xenorat
73.131.36.77
Saturn Temp Spoofer
-
install_path
appdata
-
port
4782
-
startup_name
AppWindows.exe
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 2208 saturntempspoofer.exe 2692 icsys.icn.exe 2696 explorer.exe 2544 spoolsv.exe 3064 svchost.exe 2564 spoolsv.exe -
Loads dropped DLL 6 IoCs
pid Process 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2692 icsys.icn.exe 2696 explorer.exe 2544 spoolsv.exe 3064 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe SaturnTempSpoofer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SaturnTempSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language saturntempspoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 828 schtasks.exe 2676 schtasks.exe 2976 schtasks.exe 2356 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2696 explorer.exe 3064 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2232 SaturnTempSpoofer.exe 2232 SaturnTempSpoofer.exe 2692 icsys.icn.exe 2692 icsys.icn.exe 2696 explorer.exe 2696 explorer.exe 2544 spoolsv.exe 2544 spoolsv.exe 3064 svchost.exe 3064 svchost.exe 2564 spoolsv.exe 2564 spoolsv.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2208 2232 SaturnTempSpoofer.exe 30 PID 2232 wrote to memory of 2208 2232 SaturnTempSpoofer.exe 30 PID 2232 wrote to memory of 2208 2232 SaturnTempSpoofer.exe 30 PID 2232 wrote to memory of 2208 2232 SaturnTempSpoofer.exe 30 PID 2232 wrote to memory of 2692 2232 SaturnTempSpoofer.exe 31 PID 2232 wrote to memory of 2692 2232 SaturnTempSpoofer.exe 31 PID 2232 wrote to memory of 2692 2232 SaturnTempSpoofer.exe 31 PID 2232 wrote to memory of 2692 2232 SaturnTempSpoofer.exe 31 PID 2208 wrote to memory of 2676 2208 saturntempspoofer.exe 32 PID 2208 wrote to memory of 2676 2208 saturntempspoofer.exe 32 PID 2208 wrote to memory of 2676 2208 saturntempspoofer.exe 32 PID 2208 wrote to memory of 2676 2208 saturntempspoofer.exe 32 PID 2692 wrote to memory of 2696 2692 icsys.icn.exe 34 PID 2692 wrote to memory of 2696 2692 icsys.icn.exe 34 PID 2692 wrote to memory of 2696 2692 icsys.icn.exe 34 PID 2692 wrote to memory of 2696 2692 icsys.icn.exe 34 PID 2696 wrote to memory of 2544 2696 explorer.exe 35 PID 2696 wrote to memory of 2544 2696 explorer.exe 35 PID 2696 wrote to memory of 2544 2696 explorer.exe 35 PID 2696 wrote to memory of 2544 2696 explorer.exe 35 PID 2544 wrote to memory of 3064 2544 spoolsv.exe 36 PID 2544 wrote to memory of 3064 2544 spoolsv.exe 36 PID 2544 wrote to memory of 3064 2544 spoolsv.exe 36 PID 2544 wrote to memory of 3064 2544 spoolsv.exe 36 PID 3064 wrote to memory of 2564 3064 svchost.exe 37 PID 3064 wrote to memory of 2564 3064 svchost.exe 37 PID 3064 wrote to memory of 2564 3064 svchost.exe 37 PID 3064 wrote to memory of 2564 3064 svchost.exe 37 PID 2696 wrote to memory of 2000 2696 explorer.exe 38 PID 2696 wrote to memory of 2000 2696 explorer.exe 38 PID 2696 wrote to memory of 2000 2696 explorer.exe 38 PID 2696 wrote to memory of 2000 2696 explorer.exe 38 PID 3064 wrote to memory of 2976 3064 svchost.exe 39 PID 3064 wrote to memory of 2976 3064 svchost.exe 39 PID 3064 wrote to memory of 2976 3064 svchost.exe 39 PID 3064 wrote to memory of 2976 3064 svchost.exe 39 PID 3064 wrote to memory of 2356 3064 svchost.exe 42 PID 3064 wrote to memory of 2356 3064 svchost.exe 42 PID 3064 wrote to memory of 2356 3064 svchost.exe 42 PID 3064 wrote to memory of 2356 3064 svchost.exe 42 PID 3064 wrote to memory of 828 3064 svchost.exe 44 PID 3064 wrote to memory of 828 3064 svchost.exe 44 PID 3064 wrote to memory of 828 3064 svchost.exe 44 PID 3064 wrote to memory of 828 3064 svchost.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\SaturnTempSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\SaturnTempSpoofer.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\users\admin\appdata\local\temp\saturntempspoofer.exec:\users\admin\appdata\local\temp\saturntempspoofer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "AppWindows.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp16FA.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2676
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:09 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2976
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:10 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2356
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:11 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:828
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:2000
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54a6533ac35b34ba35ea7fe0a37192a66
SHA129d3cbd1d4b9542175c17d6d4f20a5d992ae4c01
SHA256b4eff105fd062397dd2931dd5b138323a3c7d05c9e4f630cf51a24949eb2bacb
SHA512a356c1d8a46679a9fc2c3a14615d98c3fb4c00ac908b8f44c99a9070cb32d00c3b3eeb1700152f12a78924de79adc2de8452432e647fe0ed46baf1e065451d3d
-
Filesize
135KB
MD5b757ce58a74655e5d89d828020966ab0
SHA1502e4756b11c445c4f098e56a78cd060a2e2371f
SHA256ea1c0e2b8b6c06256fa98bda55ee7576ad63d02ea34a1f28d725629de2e4d8cb
SHA5129601bc5df8bc471d3ace5a13b2ef86b420e7721f06876fff8b95cd28315f2a9518e4003a3f1c3bb3322229699adda923044a3fb31fa5927fd46428932e732cb4
-
Filesize
46KB
MD5601c4ed7cdaa8a844937fe5fd62a8aff
SHA15ad9cf4a98cff0711ef7c0ca68353161d026a783
SHA256c1d9b0e2b4967ddeace94b452b8db110137d165c4725d3ab61ec0a8b44f27765
SHA51217d9b61107f327da1baed79779b834e669ecc4c38515e7334cc3424d9e773966937de09dc364111af37013fcdd3b00a3cd0cfcc2950db2bb61797ee1704cd477
-
Filesize
135KB
MD5d6d054e7390aa12da74bd9dfaf246917
SHA162d73f8b9b0cae264d2036204c4c6b05f4fa88d2
SHA256b89f7426b1d3c5293ff6d0d51f5673c4e670f15d47463461785daec6e3e98903
SHA51266e4dedd18ad17a9df47dc553937a7048177bf439b682dddb7dcc847e48fdbd00b1e280fd9c5448fc03569c610e104e803dccd5fc0eecc2a140a298ea95f45c2
-
Filesize
135KB
MD56ee20a7aa3e7b5f073ac249faf3c83d1
SHA1eee1ccd55f88478bef0d2b8f8cfa7feaba1daaf5
SHA256b116c91497f64fbbc43af917b8330ebdc3733c1abd0e25bb8bb93a746b652bf8
SHA512fa26dc651e43feb0b7a7ce3229b0af16a5b0634423a37326e1ebbda693d1cb7e5c72c524ba51cdab14f2c808630dd7d26c953c61953444531286efbd21639a10
-
Filesize
135KB
MD5110bcf60dca77060d23c34842a5e2208
SHA150832a1b0f131a9dfb165aebc6fb41cd71e0e48b
SHA2565e7e21baeb7fc6dfa89ad3c2452b6063e5b998667a78a99a56cc09df2c54eef0
SHA5129a7cdb68611af93f25437013a484955ccadafa4cd167eacfcd9b2c08109cf1a5d9d24ee7744c62cc9a00a42f9a7c0089d2974f678bc3f7583df4a8d482604e4c