Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2023 15:33
Behavioral task
behavioral1
Sample
241e21d6765c970c6092fbe0ba00a6af_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
241e21d6765c970c6092fbe0ba00a6af_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
241e21d6765c970c6092fbe0ba00a6af_JC.exe
-
Size
101KB
-
MD5
241e21d6765c970c6092fbe0ba00a6af
-
SHA1
721c1c3ad2214ce099756a44c77579ffcef55b6d
-
SHA256
1debc837add53cd6baf31583a71385eab6aeefc19684549cffe5c539763a0b41
-
SHA512
3f3568d60520fcbe6e9e2ad694bd6a093fd25b7d998fcd7ca3b18c7934de7907c58c63628245b3b76e04cf0da8446ece105a547240ff47e91a9bda2109513be3
-
SSDEEP
1536:9JbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrfPTEzo:/bfVk29te2jqxCEtg30BLbEE
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
241e21d6765c970c6092fbe0ba00a6af_JC.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation 241e21d6765c970c6092fbe0ba00a6af_JC.exe -
Executes dropped EXE 1 IoCs
Processes:
AdobeUpdate.exepid process 2380 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
241e21d6765c970c6092fbe0ba00a6af_JC.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" 241e21d6765c970c6092fbe0ba00a6af_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
241e21d6765c970c6092fbe0ba00a6af_JC.exedescription pid process Token: SeIncBasePriorityPrivilege 4100 241e21d6765c970c6092fbe0ba00a6af_JC.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
241e21d6765c970c6092fbe0ba00a6af_JC.execmd.exedescription pid process target process PID 4100 wrote to memory of 2380 4100 241e21d6765c970c6092fbe0ba00a6af_JC.exe AdobeUpdate.exe PID 4100 wrote to memory of 2380 4100 241e21d6765c970c6092fbe0ba00a6af_JC.exe AdobeUpdate.exe PID 4100 wrote to memory of 2380 4100 241e21d6765c970c6092fbe0ba00a6af_JC.exe AdobeUpdate.exe PID 4100 wrote to memory of 3000 4100 241e21d6765c970c6092fbe0ba00a6af_JC.exe cmd.exe PID 4100 wrote to memory of 3000 4100 241e21d6765c970c6092fbe0ba00a6af_JC.exe cmd.exe PID 4100 wrote to memory of 3000 4100 241e21d6765c970c6092fbe0ba00a6af_JC.exe cmd.exe PID 3000 wrote to memory of 3404 3000 cmd.exe PING.EXE PID 3000 wrote to memory of 3404 3000 cmd.exe PING.EXE PID 3000 wrote to memory of 3404 3000 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\241e21d6765c970c6092fbe0ba00a6af_JC.exe"C:\Users\Admin\AppData\Local\Temp\241e21d6765c970c6092fbe0ba00a6af_JC.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
PID:2380
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\241e21d6765c970c6092fbe0ba00a6af_JC.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3404
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5703fbb8db11d5ffea75455fcfb9b4d6d
SHA1d1b22a3cda49ae07d20409a78a863b1aaf906c6d
SHA256914427e1d943c2efb00123ec6ee6c71647bada797f506d32e5d555989645b08a
SHA512e552661c5fa855ed7f40809a19acb1abe83ba7a17f0d0951154a1cbcc7e8718afc72811fc8b55a1bf8c8d2f62efcc66f6a1a84bf88e47c70d16c9d4fa4876dd1
-
Filesize
101KB
MD5703fbb8db11d5ffea75455fcfb9b4d6d
SHA1d1b22a3cda49ae07d20409a78a863b1aaf906c6d
SHA256914427e1d943c2efb00123ec6ee6c71647bada797f506d32e5d555989645b08a
SHA512e552661c5fa855ed7f40809a19acb1abe83ba7a17f0d0951154a1cbcc7e8718afc72811fc8b55a1bf8c8d2f62efcc66f6a1a84bf88e47c70d16c9d4fa4876dd1