Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
satan.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
satan.exe
Resource
win10v2004-20241007-en
General
-
Target
satan.exe
-
Size
184KB
-
MD5
c9c341eaf04c89933ed28cbc2739d325
-
SHA1
c5b7d47aef3bd33a24293138fcba3a5ff286c2a8
-
SHA256
1a0a2fd546e3c05e15b2db3b531cb8e8755641f5f1c17910ce2fb7bbce2a05b7
-
SHA512
7cfa6ec0be0f5ae80404c6c709a6fd00ca10a18b6def5ca746611d0d32a9552f7961ab0ebf8a336b27f7058d700205be7fcc859a30d7d185aa9457267090f99b
-
SSDEEP
3072:H8SIBtQnE7OhssdWJ5jy392aCmCbBq0ryEbh/Wl7hqU6Q4NJ15xgDbvSY5thfRb3:c7qvhssdu5jyYaCmCQVE6hqUI5sb9Rb3
Malware Config
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2016 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
imak.exeimak.exepid process 1980 imak.exe 2260 imak.exe -
Loads dropped DLL 3 IoCs
Processes:
satan.exeimak.exepid process 2688 satan.exe 2688 satan.exe 1980 imak.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
taskhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\{163CA56F-6DDF-65F4-C372-D97C02965D68} = "C:\\Users\\Admin\\AppData\\Roaming\\Ogzuod\\imak.exe" taskhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 36 IoCs
Processes:
taskhost.exeDwm.exeExplorer.EXEimak.exeDllHost.exeDllHost.exeDllHost.exeDllHost.exeDllHost.exepid process 1104 taskhost.exe 1104 taskhost.exe 1104 taskhost.exe 1104 taskhost.exe 1172 Dwm.exe 1172 Dwm.exe 1172 Dwm.exe 1252 Explorer.EXE 1252 Explorer.EXE 1252 Explorer.EXE 1252 Explorer.EXE 2260 imak.exe 2260 imak.exe 2260 imak.exe 2260 imak.exe 1412 DllHost.exe 1412 DllHost.exe 1412 DllHost.exe 1412 DllHost.exe 2260 imak.exe 1076 DllHost.exe 1076 DllHost.exe 1076 DllHost.exe 1076 DllHost.exe 1752 DllHost.exe 1752 DllHost.exe 1752 DllHost.exe 1752 DllHost.exe 2740 DllHost.exe 2740 DllHost.exe 2740 DllHost.exe 2740 DllHost.exe 2800 DllHost.exe 2800 DllHost.exe 2800 DllHost.exe 2800 DllHost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
satan.exeimak.exedescription pid process target process PID 304 set thread context of 2688 304 satan.exe satan.exe PID 1980 set thread context of 2260 1980 imak.exe imak.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
satan.exesatan.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language satan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language satan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1488 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
satan.exeimak.exeimak.exetaskhost.exepid process 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 304 satan.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 1980 imak.exe 2260 imak.exe 2260 imak.exe 1104 taskhost.exe 1104 taskhost.exe 1104 taskhost.exe 1104 taskhost.exe 1104 taskhost.exe 1104 taskhost.exe 1104 taskhost.exe 1104 taskhost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2788 vssvc.exe Token: SeRestorePrivilege 2788 vssvc.exe Token: SeAuditPrivilege 2788 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
satan.exesatan.exeimak.exeimak.exetaskhost.exedescription pid process target process PID 304 wrote to memory of 2688 304 satan.exe satan.exe PID 304 wrote to memory of 2688 304 satan.exe satan.exe PID 304 wrote to memory of 2688 304 satan.exe satan.exe PID 304 wrote to memory of 2688 304 satan.exe satan.exe PID 304 wrote to memory of 2688 304 satan.exe satan.exe PID 304 wrote to memory of 2688 304 satan.exe satan.exe PID 304 wrote to memory of 2688 304 satan.exe satan.exe PID 304 wrote to memory of 2688 304 satan.exe satan.exe PID 304 wrote to memory of 2688 304 satan.exe satan.exe PID 304 wrote to memory of 2688 304 satan.exe satan.exe PID 2688 wrote to memory of 1980 2688 satan.exe imak.exe PID 2688 wrote to memory of 1980 2688 satan.exe imak.exe PID 2688 wrote to memory of 1980 2688 satan.exe imak.exe PID 2688 wrote to memory of 1980 2688 satan.exe imak.exe PID 2688 wrote to memory of 2016 2688 satan.exe cmd.exe PID 2688 wrote to memory of 2016 2688 satan.exe cmd.exe PID 2688 wrote to memory of 2016 2688 satan.exe cmd.exe PID 2688 wrote to memory of 2016 2688 satan.exe cmd.exe PID 1980 wrote to memory of 2260 1980 imak.exe imak.exe PID 1980 wrote to memory of 2260 1980 imak.exe imak.exe PID 1980 wrote to memory of 2260 1980 imak.exe imak.exe PID 1980 wrote to memory of 2260 1980 imak.exe imak.exe PID 1980 wrote to memory of 2260 1980 imak.exe imak.exe PID 1980 wrote to memory of 2260 1980 imak.exe imak.exe PID 1980 wrote to memory of 2260 1980 imak.exe imak.exe PID 1980 wrote to memory of 2260 1980 imak.exe imak.exe PID 1980 wrote to memory of 2260 1980 imak.exe imak.exe PID 1980 wrote to memory of 2260 1980 imak.exe imak.exe PID 2260 wrote to memory of 1104 2260 imak.exe taskhost.exe PID 2260 wrote to memory of 1104 2260 imak.exe taskhost.exe PID 2260 wrote to memory of 1104 2260 imak.exe taskhost.exe PID 2260 wrote to memory of 1172 2260 imak.exe Dwm.exe PID 2260 wrote to memory of 1172 2260 imak.exe Dwm.exe PID 2260 wrote to memory of 1172 2260 imak.exe Dwm.exe PID 2260 wrote to memory of 1252 2260 imak.exe Explorer.EXE PID 2260 wrote to memory of 1252 2260 imak.exe Explorer.EXE PID 2260 wrote to memory of 1252 2260 imak.exe Explorer.EXE PID 2260 wrote to memory of 1656 2260 imak.exe DllHost.exe PID 2260 wrote to memory of 1656 2260 imak.exe DllHost.exe PID 2260 wrote to memory of 1656 2260 imak.exe DllHost.exe PID 2260 wrote to memory of 2188 2260 imak.exe conhost.exe PID 2260 wrote to memory of 2188 2260 imak.exe conhost.exe PID 2260 wrote to memory of 2188 2260 imak.exe conhost.exe PID 1104 wrote to memory of 1488 1104 taskhost.exe vssadmin.exe PID 1104 wrote to memory of 1488 1104 taskhost.exe vssadmin.exe PID 1104 wrote to memory of 1488 1104 taskhost.exe vssadmin.exe PID 1104 wrote to memory of 2260 1104 taskhost.exe imak.exe PID 1104 wrote to memory of 2260 1104 taskhost.exe imak.exe PID 1104 wrote to memory of 2260 1104 taskhost.exe imak.exe PID 1104 wrote to memory of 1412 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 1412 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 1412 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 1076 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 1076 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 1076 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 1752 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 1752 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 1752 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 2740 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 2740 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 2740 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 2800 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 2800 1104 taskhost.exe DllHost.exe PID 1104 wrote to memory of 2800 1104 taskhost.exe DllHost.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1488
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\satan.exe"C:\Users\Admin\AppData\Local\Temp\satan.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Users\Admin\AppData\Local\Temp\satan.exe"C:\Users\Admin\AppData\Local\Temp\satan.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Roaming\Ogzuod\imak.exe"C:\Users\Admin\AppData\Roaming\Ogzuod\imak.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\Ogzuod\imak.exe"C:\Users\Admin\AppData\Roaming\Ogzuod\imak.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_c4d77dac.bat"4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1656
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1039509817968555902-2008950167-580571144028244717465770846487272551178158462"1⤵PID:2188
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1412
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1076
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1752
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2740
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD56cbc448269ca82be8bae4f6033e89dd8
SHA1842a7f1fe4a3beeba1e14752c68d2ed479abe6b8
SHA2565e956e6edac181ab5e579ba85ff18d6f1715e758009fcf5fac7dab7f3716f855
SHA512a6fe9d92dc661fd2fa444a52e87dcd9cae818424edb3cf9f90ef072c3c97621642ec250f0ae9445e55d7f36bce8236044b5ffc2d1d15157f567f98dc5195e096
-
Filesize
67KB
MD503b9de6c010b9cdff0f41fbbdcb8d2fe
SHA1c5bbe39414169408fbaab352a9d7139c9ea8bcae
SHA256dcdf173f38a8968f4017af44d02e9bc8b21ceff1a4caeb5bbc3c5441f53426e6
SHA51220518ea344256806e5239ca8e2fb8858263aecba5d5c62bff2fc73d8c17a7ffbf06620272f3baefa0dc035cb3f0bc98766c137e1953463f477a1a9f7d1f1c5d3