Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 13:29
Behavioral task
behavioral1
Sample
c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe
-
Size
332KB
-
MD5
c7e0d171f1a3f77fd83cf2898cdbdcd8
-
SHA1
5606572d9fc5af80a574beea1d3881aa82cd3dd3
-
SHA256
8d6b2e4295354b5069d4d021f29fc110e9ea6d788162bcd53234f08e65c44795
-
SHA512
8405ea0ecc8389280a9a4b34fe44abf6e8e42a479b9c88edb686e0f1a90462df045c77324a26374869e0fb064788db525b567c5a16f75ff1cf8cdf2de9e8e5ab
-
SSDEEP
6144:Nj9c2WYd30BKmiPVpU3ypIPr3D3StNynyS/t:NSI2H5
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe -
Executes dropped EXE 1 IoCs
Processes:
AdobeUpdate.exepid process 2428 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exedescription pid process Token: SeIncBasePriorityPrivilege 2576 c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.execmd.exedescription pid process target process PID 2576 wrote to memory of 2428 2576 c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe AdobeUpdate.exe PID 2576 wrote to memory of 2428 2576 c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe AdobeUpdate.exe PID 2576 wrote to memory of 2428 2576 c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe AdobeUpdate.exe PID 2576 wrote to memory of 2244 2576 c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe cmd.exe PID 2576 wrote to memory of 2244 2576 c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe cmd.exe PID 2576 wrote to memory of 2244 2576 c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe cmd.exe PID 2244 wrote to memory of 4312 2244 cmd.exe PING.EXE PID 2244 wrote to memory of 4312 2244 cmd.exe PING.EXE PID 2244 wrote to memory of 4312 2244 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe"C:\Users\Admin\AppData\Local\Temp\c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\c7e0d171f1a3f77fd83cf2898cdbdcd8_JC.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD5b799dadaae4bce90295185cdf2098470
SHA1569c57e0f36b8bc7805ccc1381204beb943e0e29
SHA2563945982e02dda4ddcd1797d229fca41c533641dd07f79f799a050c2777684743
SHA5125836d4b474ab7b6294c8881e6ba6d22ebddc6d53ff7e7e54e4ed24a5760dd27801104eefeba4054e0a3464ce7a9e3b00d92843e1d0495dd67da9be4a577487d8
-
Filesize
332KB
MD5b799dadaae4bce90295185cdf2098470
SHA1569c57e0f36b8bc7805ccc1381204beb943e0e29
SHA2563945982e02dda4ddcd1797d229fca41c533641dd07f79f799a050c2777684743
SHA5125836d4b474ab7b6294c8881e6ba6d22ebddc6d53ff7e7e54e4ed24a5760dd27801104eefeba4054e0a3464ce7a9e3b00d92843e1d0495dd67da9be4a577487d8