Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 19:49
Behavioral task
behavioral1
Sample
2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe
Resource
win10v2004-20240802-en
General
-
Target
2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe
-
Size
331KB
-
MD5
84227dfd0421e4e91863f0e5396ea974
-
SHA1
c5ffe9ec1fa7651b390baf4010a26b59fb884e19
-
SHA256
2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6
-
SHA512
f0e706a36b3b2036838ea0fc37383343de9909f7b62905652f2230f2e84de8f0fe51e26cdf581f384fde106230bd720fa486242736a9ac5bf3d283cc14bde556
-
SSDEEP
6144:Nj9c2WYd30BKmiPVpU3ypIPr3D3StNynyS/5:NSI2Hl
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000017400-1.dat family_sakula -
Deletes itself 1 IoCs
pid Process 2572 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2104 AdobeUpdate.exe -
Loads dropped DLL 4 IoCs
pid Process 2080 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe 2104 AdobeUpdate.exe 2104 AdobeUpdate.exe 2104 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2632 PING.EXE 2572 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2632 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2080 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2104 2080 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe 30 PID 2080 wrote to memory of 2104 2080 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe 30 PID 2080 wrote to memory of 2104 2080 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe 30 PID 2080 wrote to memory of 2104 2080 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe 30 PID 2080 wrote to memory of 2104 2080 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe 30 PID 2080 wrote to memory of 2104 2080 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe 30 PID 2080 wrote to memory of 2104 2080 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe 30 PID 2080 wrote to memory of 2572 2080 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe 32 PID 2080 wrote to memory of 2572 2080 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe 32 PID 2080 wrote to memory of 2572 2080 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe 32 PID 2080 wrote to memory of 2572 2080 2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe 32 PID 2572 wrote to memory of 2632 2572 cmd.exe 34 PID 2572 wrote to memory of 2632 2572 cmd.exe 34 PID 2572 wrote to memory of 2632 2572 cmd.exe 34 PID 2572 wrote to memory of 2632 2572 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe"C:\Users\Admin\AppData\Local\Temp\2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2104
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\2955a706f39c2530395b1e19ece5323e5064c1c777fac0f85cd90e7c8cb778e6.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
331KB
MD5ee18582ad8efa88f21979ab99610b8dc
SHA1e0cddc5a17eae07eafbbc998b3d1b54a4e9158bf
SHA2567db851c57856cb1fdcb646063095ed0c6fd0808db752e37ecbc142683063e61a
SHA5122b471c39a340874c924090898f33d018997f856675e5def3c89b6a2929c2602b8c45a7c61fb7cc4a5a3f6d5d35a73d9597590cabb5fe1eba4d8e5d2d51e27acc