Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 19:06
Behavioral task
behavioral1
Sample
ed0585b165ddf521f147f423ac2598b3_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ed0585b165ddf521f147f423ac2598b3_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
ed0585b165ddf521f147f423ac2598b3_JC.exe
-
Size
92KB
-
MD5
ed0585b165ddf521f147f423ac2598b3
-
SHA1
489ab8dd51a2d857ff3cbf45341d314d3058678a
-
SHA256
e90689d3748f94db3053fdd7c2b522f4de5a3ac6277ebc9c941123c2d8af2a17
-
SHA512
f9b7d0e87ab1d895be686b2acdbbc477b3a3639c7f8338b98b5b66384235691f94b1bde85ec9140e5bd3955faacde070abef7968c706112a81df0dc74d021345
-
SSDEEP
1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtr/:9bfVk29te2jqxCEtg30B7
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023130-2.dat family_sakula behavioral2/files/0x0008000000023130-3.dat family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation ed0585b165ddf521f147f423ac2598b3_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 3628 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" ed0585b165ddf521f147f423ac2598b3_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1620 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 732 ed0585b165ddf521f147f423ac2598b3_JC.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 732 wrote to memory of 3628 732 ed0585b165ddf521f147f423ac2598b3_JC.exe 84 PID 732 wrote to memory of 3628 732 ed0585b165ddf521f147f423ac2598b3_JC.exe 84 PID 732 wrote to memory of 3628 732 ed0585b165ddf521f147f423ac2598b3_JC.exe 84 PID 732 wrote to memory of 3796 732 ed0585b165ddf521f147f423ac2598b3_JC.exe 92 PID 732 wrote to memory of 3796 732 ed0585b165ddf521f147f423ac2598b3_JC.exe 92 PID 732 wrote to memory of 3796 732 ed0585b165ddf521f147f423ac2598b3_JC.exe 92 PID 3796 wrote to memory of 1620 3796 cmd.exe 94 PID 3796 wrote to memory of 1620 3796 cmd.exe 94 PID 3796 wrote to memory of 1620 3796 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed0585b165ddf521f147f423ac2598b3_JC.exe"C:\Users\Admin\AppData\Local\Temp\ed0585b165ddf521f147f423ac2598b3_JC.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
PID:3628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\ed0585b165ddf521f147f423ac2598b3_JC.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD55fa5fa48b1363f3a08d1acb6e0ff9058
SHA18d00c0aac49b8b07e2d5ebb749b7a603b88527dd
SHA2568e15c394841fb7120f735dc2a08f0d8de4fb718f9f9f178a750feeeae8ae300d
SHA51246614da27a5196c9addbaebfa978da3998e23f1cba33a8f72bcca50396ee08cc555e744df01eda9cb83f270031f38e3cd885401d2f85ea1c14f35d799b4d16d1
-
Filesize
92KB
MD55fa5fa48b1363f3a08d1acb6e0ff9058
SHA18d00c0aac49b8b07e2d5ebb749b7a603b88527dd
SHA2568e15c394841fb7120f735dc2a08f0d8de4fb718f9f9f178a750feeeae8ae300d
SHA51246614da27a5196c9addbaebfa978da3998e23f1cba33a8f72bcca50396ee08cc555e744df01eda9cb83f270031f38e3cd885401d2f85ea1c14f35d799b4d16d1