Analysis
-
max time kernel
120s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
44aff363646429325be5c3f8745a6750N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
44aff363646429325be5c3f8745a6750N.exe
Resource
win10v2004-20240709-en
General
-
Target
44aff363646429325be5c3f8745a6750N.exe
-
Size
39KB
-
MD5
44aff363646429325be5c3f8745a6750
-
SHA1
3d998719e90454331751c4057908862c876d8701
-
SHA256
bb98ae1ad2131bd43ea983a32c7f95d7a17a647ab5b143aa2143e1eefd8fb682
-
SHA512
d2161979a58c5f9bce92f28593522ea9c0db3cbc997780bc053117cced568b1d4db42c276a2b61607e8fa5dfa249bceaaee3f87fdc4142a4524cd99a26606ab0
-
SSDEEP
768:EXgqefjKf3Z6qSRnzpdwT1RIj1egKRFXSp/Dfm982r7D7:QgqeGB6qAnzpdw5Y0wLm9hH
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula payload 3 IoCs
resource yara_rule behavioral1/memory/2316-18-0x0000000000400000-0x000000000041B000-memory.dmp family_sakula behavioral1/memory/760-19-0x0000000000400000-0x000000000041B000-memory.dmp family_sakula behavioral1/memory/2316-25-0x0000000000400000-0x000000000041B000-memory.dmp family_sakula -
Deletes itself 1 IoCs
pid Process 2136 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 760 AdobeUpdate.exe -
Loads dropped DLL 4 IoCs
pid Process 2316 44aff363646429325be5c3f8745a6750N.exe 760 AdobeUpdate.exe 760 AdobeUpdate.exe 760 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" 44aff363646429325be5c3f8745a6750N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44aff363646429325be5c3f8745a6750N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2136 cmd.exe 2812 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2812 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2316 44aff363646429325be5c3f8745a6750N.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2316 wrote to memory of 760 2316 44aff363646429325be5c3f8745a6750N.exe 31 PID 2316 wrote to memory of 760 2316 44aff363646429325be5c3f8745a6750N.exe 31 PID 2316 wrote to memory of 760 2316 44aff363646429325be5c3f8745a6750N.exe 31 PID 2316 wrote to memory of 760 2316 44aff363646429325be5c3f8745a6750N.exe 31 PID 2316 wrote to memory of 760 2316 44aff363646429325be5c3f8745a6750N.exe 31 PID 2316 wrote to memory of 760 2316 44aff363646429325be5c3f8745a6750N.exe 31 PID 2316 wrote to memory of 760 2316 44aff363646429325be5c3f8745a6750N.exe 31 PID 2316 wrote to memory of 2136 2316 44aff363646429325be5c3f8745a6750N.exe 33 PID 2316 wrote to memory of 2136 2316 44aff363646429325be5c3f8745a6750N.exe 33 PID 2316 wrote to memory of 2136 2316 44aff363646429325be5c3f8745a6750N.exe 33 PID 2316 wrote to memory of 2136 2316 44aff363646429325be5c3f8745a6750N.exe 33 PID 2136 wrote to memory of 2812 2136 cmd.exe 35 PID 2136 wrote to memory of 2812 2136 cmd.exe 35 PID 2136 wrote to memory of 2812 2136 cmd.exe 35 PID 2136 wrote to memory of 2812 2136 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\44aff363646429325be5c3f8745a6750N.exe"C:\Users\Admin\AppData\Local\Temp\44aff363646429325be5c3f8745a6750N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\44aff363646429325be5c3f8745a6750N.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD55ee036685d53e0985e713cad41d7d201
SHA1d6dae43ee8e19e4bcf09123cfb67c156f219332f
SHA256ec0fe629a3abef80af86c3c9d5e6364201ce44bd49f1c54d54c5d69127debcc8
SHA5123e711bd094ba0cce2b8a580f452d4055fd6350b9c8a2f0b214df726c107e41e9bf46a7a26b2b4dbab678e24503815305b03aaa983c4a7e54cd9a90b1cd1117be