Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 19:06
Behavioral task
behavioral1
Sample
ed0585b165ddf521f147f423ac2598b3_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ed0585b165ddf521f147f423ac2598b3_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
ed0585b165ddf521f147f423ac2598b3_JC.exe
-
Size
92KB
-
MD5
ed0585b165ddf521f147f423ac2598b3
-
SHA1
489ab8dd51a2d857ff3cbf45341d314d3058678a
-
SHA256
e90689d3748f94db3053fdd7c2b522f4de5a3ac6277ebc9c941123c2d8af2a17
-
SHA512
f9b7d0e87ab1d895be686b2acdbbc477b3a3639c7f8338b98b5b66384235691f94b1bde85ec9140e5bd3955faacde070abef7968c706112a81df0dc74d021345
-
SSDEEP
1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtr/:9bfVk29te2jqxCEtg30B7
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula payload 6 IoCs
resource yara_rule behavioral1/files/0x000b00000001228f-1.dat family_sakula behavioral1/files/0x000b00000001228f-5.dat family_sakula behavioral1/files/0x000b00000001228f-4.dat family_sakula behavioral1/files/0x000b00000001228f-6.dat family_sakula behavioral1/files/0x000b00000001228f-7.dat family_sakula behavioral1/files/0x000b00000001228f-8.dat family_sakula -
Deletes itself 1 IoCs
pid Process 2016 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 240 AdobeUpdate.exe -
Loads dropped DLL 4 IoCs
pid Process 2432 ed0585b165ddf521f147f423ac2598b3_JC.exe 240 AdobeUpdate.exe 240 AdobeUpdate.exe 240 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" ed0585b165ddf521f147f423ac2598b3_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1904 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2432 ed0585b165ddf521f147f423ac2598b3_JC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2432 wrote to memory of 240 2432 ed0585b165ddf521f147f423ac2598b3_JC.exe 28 PID 2432 wrote to memory of 240 2432 ed0585b165ddf521f147f423ac2598b3_JC.exe 28 PID 2432 wrote to memory of 240 2432 ed0585b165ddf521f147f423ac2598b3_JC.exe 28 PID 2432 wrote to memory of 240 2432 ed0585b165ddf521f147f423ac2598b3_JC.exe 28 PID 2432 wrote to memory of 240 2432 ed0585b165ddf521f147f423ac2598b3_JC.exe 28 PID 2432 wrote to memory of 240 2432 ed0585b165ddf521f147f423ac2598b3_JC.exe 28 PID 2432 wrote to memory of 240 2432 ed0585b165ddf521f147f423ac2598b3_JC.exe 28 PID 2432 wrote to memory of 2016 2432 ed0585b165ddf521f147f423ac2598b3_JC.exe 32 PID 2432 wrote to memory of 2016 2432 ed0585b165ddf521f147f423ac2598b3_JC.exe 32 PID 2432 wrote to memory of 2016 2432 ed0585b165ddf521f147f423ac2598b3_JC.exe 32 PID 2432 wrote to memory of 2016 2432 ed0585b165ddf521f147f423ac2598b3_JC.exe 32 PID 2016 wrote to memory of 1904 2016 cmd.exe 34 PID 2016 wrote to memory of 1904 2016 cmd.exe 34 PID 2016 wrote to memory of 1904 2016 cmd.exe 34 PID 2016 wrote to memory of 1904 2016 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed0585b165ddf521f147f423ac2598b3_JC.exe"C:\Users\Admin\AppData\Local\Temp\ed0585b165ddf521f147f423ac2598b3_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:240
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\ed0585b165ddf521f147f423ac2598b3_JC.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5496de98c847fbbf8a8c053007e96fdf7
SHA171060e9f2384001e33fb7bb96b43a4ed4498cbca
SHA256ccf68f3ea99fd8b6328799eb70a73dec5b951d4e49ee4b6d35f2037fc6a4a7a5
SHA512d9646c89b2c2e4caceedad306261000c347c7c0cbe64344d2f9515f8f426cedca8d217f32650800687c1e26d1e698242b2cbccc44d58c9dbe285138e1eff3945
-
Filesize
92KB
MD5496de98c847fbbf8a8c053007e96fdf7
SHA171060e9f2384001e33fb7bb96b43a4ed4498cbca
SHA256ccf68f3ea99fd8b6328799eb70a73dec5b951d4e49ee4b6d35f2037fc6a4a7a5
SHA512d9646c89b2c2e4caceedad306261000c347c7c0cbe64344d2f9515f8f426cedca8d217f32650800687c1e26d1e698242b2cbccc44d58c9dbe285138e1eff3945
-
Filesize
92KB
MD5496de98c847fbbf8a8c053007e96fdf7
SHA171060e9f2384001e33fb7bb96b43a4ed4498cbca
SHA256ccf68f3ea99fd8b6328799eb70a73dec5b951d4e49ee4b6d35f2037fc6a4a7a5
SHA512d9646c89b2c2e4caceedad306261000c347c7c0cbe64344d2f9515f8f426cedca8d217f32650800687c1e26d1e698242b2cbccc44d58c9dbe285138e1eff3945
-
Filesize
92KB
MD5496de98c847fbbf8a8c053007e96fdf7
SHA171060e9f2384001e33fb7bb96b43a4ed4498cbca
SHA256ccf68f3ea99fd8b6328799eb70a73dec5b951d4e49ee4b6d35f2037fc6a4a7a5
SHA512d9646c89b2c2e4caceedad306261000c347c7c0cbe64344d2f9515f8f426cedca8d217f32650800687c1e26d1e698242b2cbccc44d58c9dbe285138e1eff3945
-
Filesize
92KB
MD5496de98c847fbbf8a8c053007e96fdf7
SHA171060e9f2384001e33fb7bb96b43a4ed4498cbca
SHA256ccf68f3ea99fd8b6328799eb70a73dec5b951d4e49ee4b6d35f2037fc6a4a7a5
SHA512d9646c89b2c2e4caceedad306261000c347c7c0cbe64344d2f9515f8f426cedca8d217f32650800687c1e26d1e698242b2cbccc44d58c9dbe285138e1eff3945
-
Filesize
92KB
MD5496de98c847fbbf8a8c053007e96fdf7
SHA171060e9f2384001e33fb7bb96b43a4ed4498cbca
SHA256ccf68f3ea99fd8b6328799eb70a73dec5b951d4e49ee4b6d35f2037fc6a4a7a5
SHA512d9646c89b2c2e4caceedad306261000c347c7c0cbe64344d2f9515f8f426cedca8d217f32650800687c1e26d1e698242b2cbccc44d58c9dbe285138e1eff3945