Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-10-2022 01:42
Behavioral task
behavioral1
Sample
ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe
Resource
win10v2004-20220901-en
General
-
Target
ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe
-
Size
101KB
-
MD5
9136918998cd24a1549e0b9ee1500024
-
SHA1
69e7a0f7026355e2279e7619a3d2dc375bcaceb2
-
SHA256
ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244
-
SHA512
895314a3a3d822e4c938b6a1db0f3dcccab3fa5325b43b4b95f892b0b421ca7df8a3afbedf987e631eb3148bdca5d114c357a7bd560463037b3ffedbcd62368e
-
SSDEEP
1536:9JbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrGPTEzl:/bfVk29te2jqxCEtg30BibEp
Malware Config
Signatures
-
Sakula payload 6 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
AdobeUpdate.exepid process 872 AdobeUpdate.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1188 cmd.exe -
Loads dropped DLL 4 IoCs
Processes:
ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exeAdobeUpdate.exepid process 896 ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe 872 AdobeUpdate.exe 872 AdobeUpdate.exe 872 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exedescription pid process Token: SeIncBasePriorityPrivilege 896 ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.execmd.exedescription pid process target process PID 896 wrote to memory of 872 896 ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe AdobeUpdate.exe PID 896 wrote to memory of 872 896 ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe AdobeUpdate.exe PID 896 wrote to memory of 872 896 ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe AdobeUpdate.exe PID 896 wrote to memory of 872 896 ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe AdobeUpdate.exe PID 896 wrote to memory of 872 896 ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe AdobeUpdate.exe PID 896 wrote to memory of 872 896 ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe AdobeUpdate.exe PID 896 wrote to memory of 872 896 ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe AdobeUpdate.exe PID 896 wrote to memory of 1188 896 ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe cmd.exe PID 896 wrote to memory of 1188 896 ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe cmd.exe PID 896 wrote to memory of 1188 896 ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe cmd.exe PID 896 wrote to memory of 1188 896 ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe cmd.exe PID 1188 wrote to memory of 1180 1188 cmd.exe PING.EXE PID 1188 wrote to memory of 1180 1188 cmd.exe PING.EXE PID 1188 wrote to memory of 1180 1188 cmd.exe PING.EXE PID 1188 wrote to memory of 1180 1188 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe"C:\Users\Admin\AppData\Local\Temp\ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeFilesize
101KB
MD502d3f1b630a038d8c2d4880b28e63da2
SHA1cf16aa75fa7bcece1ba2788a259530c376af4d62
SHA256c5bd2cdafffc937793d952e46494fac8777979f1f4df0a20a134e3dcc80d3748
SHA5129625fd6394aaeec81bcbecec6ccf1062d32077515f0d7ff57a7e52b6ede8a83212901378995968787d697e6345f6eb1346d1c8b7db8cc790a81d776f033ca728
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeFilesize
101KB
MD502d3f1b630a038d8c2d4880b28e63da2
SHA1cf16aa75fa7bcece1ba2788a259530c376af4d62
SHA256c5bd2cdafffc937793d952e46494fac8777979f1f4df0a20a134e3dcc80d3748
SHA5129625fd6394aaeec81bcbecec6ccf1062d32077515f0d7ff57a7e52b6ede8a83212901378995968787d697e6345f6eb1346d1c8b7db8cc790a81d776f033ca728
-
\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeFilesize
101KB
MD502d3f1b630a038d8c2d4880b28e63da2
SHA1cf16aa75fa7bcece1ba2788a259530c376af4d62
SHA256c5bd2cdafffc937793d952e46494fac8777979f1f4df0a20a134e3dcc80d3748
SHA5129625fd6394aaeec81bcbecec6ccf1062d32077515f0d7ff57a7e52b6ede8a83212901378995968787d697e6345f6eb1346d1c8b7db8cc790a81d776f033ca728
-
\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeFilesize
101KB
MD502d3f1b630a038d8c2d4880b28e63da2
SHA1cf16aa75fa7bcece1ba2788a259530c376af4d62
SHA256c5bd2cdafffc937793d952e46494fac8777979f1f4df0a20a134e3dcc80d3748
SHA5129625fd6394aaeec81bcbecec6ccf1062d32077515f0d7ff57a7e52b6ede8a83212901378995968787d697e6345f6eb1346d1c8b7db8cc790a81d776f033ca728
-
\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeFilesize
101KB
MD502d3f1b630a038d8c2d4880b28e63da2
SHA1cf16aa75fa7bcece1ba2788a259530c376af4d62
SHA256c5bd2cdafffc937793d952e46494fac8777979f1f4df0a20a134e3dcc80d3748
SHA5129625fd6394aaeec81bcbecec6ccf1062d32077515f0d7ff57a7e52b6ede8a83212901378995968787d697e6345f6eb1346d1c8b7db8cc790a81d776f033ca728
-
\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeFilesize
101KB
MD502d3f1b630a038d8c2d4880b28e63da2
SHA1cf16aa75fa7bcece1ba2788a259530c376af4d62
SHA256c5bd2cdafffc937793d952e46494fac8777979f1f4df0a20a134e3dcc80d3748
SHA5129625fd6394aaeec81bcbecec6ccf1062d32077515f0d7ff57a7e52b6ede8a83212901378995968787d697e6345f6eb1346d1c8b7db8cc790a81d776f033ca728
-
memory/872-56-0x0000000000000000-mapping.dmp
-
memory/896-54-0x0000000075B41000-0x0000000075B43000-memory.dmpFilesize
8KB
-
memory/1180-64-0x0000000000000000-mapping.dmp
-
memory/1188-63-0x0000000000000000-mapping.dmp