Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03-10-2023 17:14
Behavioral task
behavioral1
Sample
32c7e18c8d7fef0760c156e6486e76a6_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
32c7e18c8d7fef0760c156e6486e76a6_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
32c7e18c8d7fef0760c156e6486e76a6_JC.exe
-
Size
101KB
-
MD5
32c7e18c8d7fef0760c156e6486e76a6
-
SHA1
f383c6460a596ead4553e697231357db8d7e1687
-
SHA256
158fad9c3229598a7ace882ef388d3e207b535572cb79feb13ac656283482576
-
SHA512
0b56da08c531ea898ca56b4b55ed04d0f8b00d4346e8550f5dd681e738e9165db96058e39c61fd4ce7ba1f5e202affdd5135a4e971e2255385a83154dd4895fe
-
SSDEEP
1536:zJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrXv/B:dbfVk29te2jqxCEtg30B1
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula payload 6 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2460 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
AdobeUpdate.exepid process 2924 AdobeUpdate.exe -
Loads dropped DLL 4 IoCs
Processes:
32c7e18c8d7fef0760c156e6486e76a6_JC.exeAdobeUpdate.exepid process 2760 32c7e18c8d7fef0760c156e6486e76a6_JC.exe 2924 AdobeUpdate.exe 2924 AdobeUpdate.exe 2924 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
32c7e18c8d7fef0760c156e6486e76a6_JC.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" 32c7e18c8d7fef0760c156e6486e76a6_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
32c7e18c8d7fef0760c156e6486e76a6_JC.exedescription pid process Token: SeIncBasePriorityPrivilege 2760 32c7e18c8d7fef0760c156e6486e76a6_JC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
32c7e18c8d7fef0760c156e6486e76a6_JC.execmd.exedescription pid process target process PID 2760 wrote to memory of 2924 2760 32c7e18c8d7fef0760c156e6486e76a6_JC.exe AdobeUpdate.exe PID 2760 wrote to memory of 2924 2760 32c7e18c8d7fef0760c156e6486e76a6_JC.exe AdobeUpdate.exe PID 2760 wrote to memory of 2924 2760 32c7e18c8d7fef0760c156e6486e76a6_JC.exe AdobeUpdate.exe PID 2760 wrote to memory of 2924 2760 32c7e18c8d7fef0760c156e6486e76a6_JC.exe AdobeUpdate.exe PID 2760 wrote to memory of 2924 2760 32c7e18c8d7fef0760c156e6486e76a6_JC.exe AdobeUpdate.exe PID 2760 wrote to memory of 2924 2760 32c7e18c8d7fef0760c156e6486e76a6_JC.exe AdobeUpdate.exe PID 2760 wrote to memory of 2924 2760 32c7e18c8d7fef0760c156e6486e76a6_JC.exe AdobeUpdate.exe PID 2760 wrote to memory of 2460 2760 32c7e18c8d7fef0760c156e6486e76a6_JC.exe cmd.exe PID 2760 wrote to memory of 2460 2760 32c7e18c8d7fef0760c156e6486e76a6_JC.exe cmd.exe PID 2760 wrote to memory of 2460 2760 32c7e18c8d7fef0760c156e6486e76a6_JC.exe cmd.exe PID 2760 wrote to memory of 2460 2760 32c7e18c8d7fef0760c156e6486e76a6_JC.exe cmd.exe PID 2460 wrote to memory of 2500 2460 cmd.exe PING.EXE PID 2460 wrote to memory of 2500 2460 cmd.exe PING.EXE PID 2460 wrote to memory of 2500 2460 cmd.exe PING.EXE PID 2460 wrote to memory of 2500 2460 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\32c7e18c8d7fef0760c156e6486e76a6_JC.exe"C:\Users\Admin\AppData\Local\Temp\32c7e18c8d7fef0760c156e6486e76a6_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2924
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\32c7e18c8d7fef0760c156e6486e76a6_JC.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2500
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5b155b7a4e2e818961712cd32acfc08d5
SHA1ca6ea0a15d2932a4a5b1b80a07afb989df9a4fbe
SHA25649a3d2dc51a12094193ec63d36b741ac8d9dd83aa209f60b3ac9cfca9f7b7736
SHA5124cfc94cd608524cde320f43a20230bb1983ac9466a871ad281490280fc4b873dd2a01fbfe80846e509ab4228115a379d6c596f60dc6450f3687cc54e146690e2
-
Filesize
101KB
MD5b155b7a4e2e818961712cd32acfc08d5
SHA1ca6ea0a15d2932a4a5b1b80a07afb989df9a4fbe
SHA25649a3d2dc51a12094193ec63d36b741ac8d9dd83aa209f60b3ac9cfca9f7b7736
SHA5124cfc94cd608524cde320f43a20230bb1983ac9466a871ad281490280fc4b873dd2a01fbfe80846e509ab4228115a379d6c596f60dc6450f3687cc54e146690e2
-
Filesize
101KB
MD5b155b7a4e2e818961712cd32acfc08d5
SHA1ca6ea0a15d2932a4a5b1b80a07afb989df9a4fbe
SHA25649a3d2dc51a12094193ec63d36b741ac8d9dd83aa209f60b3ac9cfca9f7b7736
SHA5124cfc94cd608524cde320f43a20230bb1983ac9466a871ad281490280fc4b873dd2a01fbfe80846e509ab4228115a379d6c596f60dc6450f3687cc54e146690e2
-
Filesize
101KB
MD5b155b7a4e2e818961712cd32acfc08d5
SHA1ca6ea0a15d2932a4a5b1b80a07afb989df9a4fbe
SHA25649a3d2dc51a12094193ec63d36b741ac8d9dd83aa209f60b3ac9cfca9f7b7736
SHA5124cfc94cd608524cde320f43a20230bb1983ac9466a871ad281490280fc4b873dd2a01fbfe80846e509ab4228115a379d6c596f60dc6450f3687cc54e146690e2
-
Filesize
101KB
MD5b155b7a4e2e818961712cd32acfc08d5
SHA1ca6ea0a15d2932a4a5b1b80a07afb989df9a4fbe
SHA25649a3d2dc51a12094193ec63d36b741ac8d9dd83aa209f60b3ac9cfca9f7b7736
SHA5124cfc94cd608524cde320f43a20230bb1983ac9466a871ad281490280fc4b873dd2a01fbfe80846e509ab4228115a379d6c596f60dc6450f3687cc54e146690e2
-
Filesize
101KB
MD5b155b7a4e2e818961712cd32acfc08d5
SHA1ca6ea0a15d2932a4a5b1b80a07afb989df9a4fbe
SHA25649a3d2dc51a12094193ec63d36b741ac8d9dd83aa209f60b3ac9cfca9f7b7736
SHA5124cfc94cd608524cde320f43a20230bb1983ac9466a871ad281490280fc4b873dd2a01fbfe80846e509ab4228115a379d6c596f60dc6450f3687cc54e146690e2