Analysis
-
max time kernel
95s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 16:37
Behavioral task
behavioral1
Sample
cf2cec6f6651ef15115d0cacd781ef60N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf2cec6f6651ef15115d0cacd781ef60N.exe
Resource
win10v2004-20240802-en
General
-
Target
cf2cec6f6651ef15115d0cacd781ef60N.exe
-
Size
92KB
-
MD5
cf2cec6f6651ef15115d0cacd781ef60
-
SHA1
22fd12c2610045ce40b3e639b1c2d85dc0198a3b
-
SHA256
6b3b9ae3ab46266fd8a9cb431d9dbee6a8722a128c478b15351bed2fd336fe2d
-
SHA512
6b27b5061c866edc5fd46f308891c22a4b9fa2dbea9e8123bd0ac9f2385d5814c9071dfa3710c45c02fd277a2ce3d4bf22c6275589d2e902bedaa5ba711ed946
-
SSDEEP
1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrQ:9bfVk29te2jqxCEtg30BM
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula payload 1 IoCs
resource yara_rule behavioral1/files/0x0025000000017234-1.dat family_sakula -
Deletes itself 1 IoCs
pid Process 2556 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2872 AdobeUpdate.exe -
Loads dropped DLL 4 IoCs
pid Process 2088 cf2cec6f6651ef15115d0cacd781ef60N.exe 2872 AdobeUpdate.exe 2872 AdobeUpdate.exe 2872 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" cf2cec6f6651ef15115d0cacd781ef60N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf2cec6f6651ef15115d0cacd781ef60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2556 cmd.exe 2588 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2588 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2088 cf2cec6f6651ef15115d0cacd781ef60N.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2872 2088 cf2cec6f6651ef15115d0cacd781ef60N.exe 30 PID 2088 wrote to memory of 2872 2088 cf2cec6f6651ef15115d0cacd781ef60N.exe 30 PID 2088 wrote to memory of 2872 2088 cf2cec6f6651ef15115d0cacd781ef60N.exe 30 PID 2088 wrote to memory of 2872 2088 cf2cec6f6651ef15115d0cacd781ef60N.exe 30 PID 2088 wrote to memory of 2872 2088 cf2cec6f6651ef15115d0cacd781ef60N.exe 30 PID 2088 wrote to memory of 2872 2088 cf2cec6f6651ef15115d0cacd781ef60N.exe 30 PID 2088 wrote to memory of 2872 2088 cf2cec6f6651ef15115d0cacd781ef60N.exe 30 PID 2088 wrote to memory of 2556 2088 cf2cec6f6651ef15115d0cacd781ef60N.exe 32 PID 2088 wrote to memory of 2556 2088 cf2cec6f6651ef15115d0cacd781ef60N.exe 32 PID 2088 wrote to memory of 2556 2088 cf2cec6f6651ef15115d0cacd781ef60N.exe 32 PID 2088 wrote to memory of 2556 2088 cf2cec6f6651ef15115d0cacd781ef60N.exe 32 PID 2556 wrote to memory of 2588 2556 cmd.exe 34 PID 2556 wrote to memory of 2588 2556 cmd.exe 34 PID 2556 wrote to memory of 2588 2556 cmd.exe 34 PID 2556 wrote to memory of 2588 2556 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf2cec6f6651ef15115d0cacd781ef60N.exe"C:\Users\Admin\AppData\Local\Temp\cf2cec6f6651ef15115d0cacd781ef60N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\cf2cec6f6651ef15115d0cacd781ef60N.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5f279ce741f90fc5700cb855dcd3475e6
SHA1d5f061da8e3414b751be64003863df9357133a49
SHA2563efc7e7a31025f612e56ad8c76a4775a509ad83d44b678810b6a91475a225863
SHA51268c697a422689e82b88890b349047845f396134fb04e02d471e20a19f48c9c54ae102e91cc342255cc30ee59f1fede49ca2aff628b4b6a67ad69a674ef600fe9