Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 18:07
Behavioral task
behavioral1
Sample
SaturnTempSpoofer.exe
Resource
win7-20240708-en
General
-
Target
SaturnTempSpoofer.exe
-
Size
181KB
-
MD5
0380311e496051295f02a440d4f34308
-
SHA1
d2b2d91ced3d0526fcb13f310bb5f7be4844b346
-
SHA256
ab0f362333e655da8332ba89226f9ac0c90e31aa53e633097cf6f88aead1a389
-
SHA512
b95a20df94c311deb080d45e1bcd7cd3f79e449041acd52bc67423adb50f49ec9e4728838f96aaec0f67d1fb9cb7403be0e445db06928434f49baac565be600e
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDalQlzw+jqZ91UbTK4I:UsLqdufVUNDaRW491Ub8
Malware Config
Extracted
xenorat
73.131.36.77
Saturn Temp Spoofer
-
install_path
appdata
-
port
4782
-
startup_name
AppWindows.exe
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 4116 saturntempspoofer.exe 2512 icsys.icn.exe 4768 explorer.exe 4944 spoolsv.exe 1996 svchost.exe 3892 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe SaturnTempSpoofer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language saturntempspoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SaturnTempSpoofer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4852 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 2512 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4768 explorer.exe 1996 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 116 SaturnTempSpoofer.exe 116 SaturnTempSpoofer.exe 2512 icsys.icn.exe 2512 icsys.icn.exe 4768 explorer.exe 4768 explorer.exe 4944 spoolsv.exe 4944 spoolsv.exe 1996 svchost.exe 1996 svchost.exe 3892 spoolsv.exe 3892 spoolsv.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 116 wrote to memory of 4116 116 SaturnTempSpoofer.exe 84 PID 116 wrote to memory of 4116 116 SaturnTempSpoofer.exe 84 PID 116 wrote to memory of 4116 116 SaturnTempSpoofer.exe 84 PID 116 wrote to memory of 2512 116 SaturnTempSpoofer.exe 87 PID 116 wrote to memory of 2512 116 SaturnTempSpoofer.exe 87 PID 116 wrote to memory of 2512 116 SaturnTempSpoofer.exe 87 PID 4116 wrote to memory of 4852 4116 saturntempspoofer.exe 88 PID 4116 wrote to memory of 4852 4116 saturntempspoofer.exe 88 PID 4116 wrote to memory of 4852 4116 saturntempspoofer.exe 88 PID 2512 wrote to memory of 4768 2512 icsys.icn.exe 90 PID 2512 wrote to memory of 4768 2512 icsys.icn.exe 90 PID 2512 wrote to memory of 4768 2512 icsys.icn.exe 90 PID 4768 wrote to memory of 4944 4768 explorer.exe 91 PID 4768 wrote to memory of 4944 4768 explorer.exe 91 PID 4768 wrote to memory of 4944 4768 explorer.exe 91 PID 4944 wrote to memory of 1996 4944 spoolsv.exe 92 PID 4944 wrote to memory of 1996 4944 spoolsv.exe 92 PID 4944 wrote to memory of 1996 4944 spoolsv.exe 92 PID 1996 wrote to memory of 3892 1996 svchost.exe 93 PID 1996 wrote to memory of 3892 1996 svchost.exe 93 PID 1996 wrote to memory of 3892 1996 svchost.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\SaturnTempSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\SaturnTempSpoofer.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:116 -
\??\c:\users\admin\appdata\local\temp\saturntempspoofer.exec:\users\admin\appdata\local\temp\saturntempspoofer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "AppWindows.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7B6A.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4852
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3892
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5601c4ed7cdaa8a844937fe5fd62a8aff
SHA15ad9cf4a98cff0711ef7c0ca68353161d026a783
SHA256c1d9b0e2b4967ddeace94b452b8db110137d165c4725d3ab61ec0a8b44f27765
SHA51217d9b61107f327da1baed79779b834e669ecc4c38515e7334cc3424d9e773966937de09dc364111af37013fcdd3b00a3cd0cfcc2950db2bb61797ee1704cd477
-
Filesize
1KB
MD54a6533ac35b34ba35ea7fe0a37192a66
SHA129d3cbd1d4b9542175c17d6d4f20a5d992ae4c01
SHA256b4eff105fd062397dd2931dd5b138323a3c7d05c9e4f630cf51a24949eb2bacb
SHA512a356c1d8a46679a9fc2c3a14615d98c3fb4c00ac908b8f44c99a9070cb32d00c3b3eeb1700152f12a78924de79adc2de8452432e647fe0ed46baf1e065451d3d
-
Filesize
135KB
MD566244c0ffa974b324b859d0097cb9d2a
SHA176175440fc1509bfb503a1fd2225b0c57552acd8
SHA2566fa38d56224d35cfaf3d4e63560305a8ede530ae021a7d535a5cea40fad9233f
SHA512c893d686b872a560136f9fef9365e12d8c9bdfa58a817c8ce3a38296d790e167b2645ff9e196962e7b669f349fa6124294116d07cfe4d878b18e5a82881a8951
-
Filesize
135KB
MD5d6d054e7390aa12da74bd9dfaf246917
SHA162d73f8b9b0cae264d2036204c4c6b05f4fa88d2
SHA256b89f7426b1d3c5293ff6d0d51f5673c4e670f15d47463461785daec6e3e98903
SHA51266e4dedd18ad17a9df47dc553937a7048177bf439b682dddb7dcc847e48fdbd00b1e280fd9c5448fc03569c610e104e803dccd5fc0eecc2a140a298ea95f45c2
-
Filesize
135KB
MD5e3a50b176ffe78c75ad0bd6f5b960e41
SHA1df05ab9a14d4e9118d4fbfdc52ff6698cb6585b9
SHA256475f5e82033e4b4a04192bc52422086e3a58a7b9348cd9947e25dcc4e82bf1f6
SHA5120ce6bee30f0221ec1a4314121a47a79c80d5eacc09e25f53a20566a6ef964e3c0e7a9ef22dc007363ab8933ea86bbae8d79df2a8db019bb87eee136eeac5e5a6
-
Filesize
135KB
MD535c72fa9759f67167bdccd8b4c4422b4
SHA11cdebd67ead4ef547e0ff4588b82b6801dca3f47
SHA25619d42815e43dcb283fe3df3fe3845e16ff3c72bb55b710e9ba2bfc30d192ae23
SHA512f486164a864ba107d72225a7c3ee5ce889872a9584291a6970a93636226cee6a7e53c8afa548235a93a8e08629a5548d02122dd8242d8ca512c872eb390c2e90