Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2023 12:55
Behavioral task
behavioral1
Sample
ed0585b165ddf521f147f423ac2598b3_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ed0585b165ddf521f147f423ac2598b3_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
ed0585b165ddf521f147f423ac2598b3_JC.exe
-
Size
92KB
-
MD5
ed0585b165ddf521f147f423ac2598b3
-
SHA1
489ab8dd51a2d857ff3cbf45341d314d3058678a
-
SHA256
e90689d3748f94db3053fdd7c2b522f4de5a3ac6277ebc9c941123c2d8af2a17
-
SHA512
f9b7d0e87ab1d895be686b2acdbbc477b3a3639c7f8338b98b5b66384235691f94b1bde85ec9140e5bd3955faacde070abef7968c706112a81df0dc74d021345
-
SSDEEP
1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtr/:9bfVk29te2jqxCEtg30B7
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ed0585b165ddf521f147f423ac2598b3_JC.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation ed0585b165ddf521f147f423ac2598b3_JC.exe -
Executes dropped EXE 1 IoCs
Processes:
AdobeUpdate.exepid process 924 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ed0585b165ddf521f147f423ac2598b3_JC.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" ed0585b165ddf521f147f423ac2598b3_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ed0585b165ddf521f147f423ac2598b3_JC.exedescription pid process Token: SeIncBasePriorityPrivilege 3752 ed0585b165ddf521f147f423ac2598b3_JC.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ed0585b165ddf521f147f423ac2598b3_JC.execmd.exedescription pid process target process PID 3752 wrote to memory of 924 3752 ed0585b165ddf521f147f423ac2598b3_JC.exe AdobeUpdate.exe PID 3752 wrote to memory of 924 3752 ed0585b165ddf521f147f423ac2598b3_JC.exe AdobeUpdate.exe PID 3752 wrote to memory of 924 3752 ed0585b165ddf521f147f423ac2598b3_JC.exe AdobeUpdate.exe PID 3752 wrote to memory of 1628 3752 ed0585b165ddf521f147f423ac2598b3_JC.exe cmd.exe PID 3752 wrote to memory of 1628 3752 ed0585b165ddf521f147f423ac2598b3_JC.exe cmd.exe PID 3752 wrote to memory of 1628 3752 ed0585b165ddf521f147f423ac2598b3_JC.exe cmd.exe PID 1628 wrote to memory of 2432 1628 cmd.exe PING.EXE PID 1628 wrote to memory of 2432 1628 cmd.exe PING.EXE PID 1628 wrote to memory of 2432 1628 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed0585b165ddf521f147f423ac2598b3_JC.exe"C:\Users\Admin\AppData\Local\Temp\ed0585b165ddf521f147f423ac2598b3_JC.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
PID:924
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\ed0585b165ddf521f147f423ac2598b3_JC.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5592bf5733384349a7551bd67cc4f1be1
SHA1b1a7b27fb907aaeebd6b3a8bf1b69785d8913ece
SHA256d51a4adc4a48f8593ecf0c16079465457b1f15c36b115657a128c9bd07598bc9
SHA512a861b370bd0c64f05db91bce12f4d96274ec61f984178c64a764603f914a629bde72d13513b2f4cf71b0f47a505abd156aa4d38cd18d63b81335cf13ffa0f90c
-
Filesize
92KB
MD5592bf5733384349a7551bd67cc4f1be1
SHA1b1a7b27fb907aaeebd6b3a8bf1b69785d8913ece
SHA256d51a4adc4a48f8593ecf0c16079465457b1f15c36b115657a128c9bd07598bc9
SHA512a861b370bd0c64f05db91bce12f4d96274ec61f984178c64a764603f914a629bde72d13513b2f4cf71b0f47a505abd156aa4d38cd18d63b81335cf13ffa0f90c