Analysis
-
max time kernel
3s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware.Satana.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ransomware.Satana.exe
Resource
win10v2004-20250314-en
General
-
Target
Ransomware.Satana.exe
-
Size
49KB
-
MD5
46bfd4f1d581d7c0121d2b19a005d3df
-
SHA1
5b063298bbd1670b4d39e1baef67f854b8dcba9d
-
SHA256
683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
-
SHA512
b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
SSDEEP
768:AbFw10RFnAwJM7MiqwecUaX5h4IuCdYa+XLXTGY1idL2WYiwtDj:Apw10vnAOIUaJh4IXdWXLXTWLfuFj
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2128 set thread context of 2580 2128 Ransomware.Satana.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ransomware.Satana.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2580 2128 Ransomware.Satana.exe 30 PID 2128 wrote to memory of 2580 2128 Ransomware.Satana.exe 30 PID 2128 wrote to memory of 2580 2128 Ransomware.Satana.exe 30 PID 2128 wrote to memory of 2580 2128 Ransomware.Satana.exe 30 PID 2128 wrote to memory of 2580 2128 Ransomware.Satana.exe 30 PID 2128 wrote to memory of 2580 2128 Ransomware.Satana.exe 30 PID 2128 wrote to memory of 2580 2128 Ransomware.Satana.exe 30 PID 2128 wrote to memory of 2580 2128 Ransomware.Satana.exe 30 PID 2128 wrote to memory of 2580 2128 Ransomware.Satana.exe 30 PID 2128 wrote to memory of 2580 2128 Ransomware.Satana.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ransomware.Satana.exe"C:\Users\Admin\AppData\Local\Temp\Ransomware.Satana.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\Ransomware.Satana.exe"C:\Users\Admin\AppData\Local\Temp\Ransomware.Satana.exe"2⤵PID:2580
-