Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 16:37
Behavioral task
behavioral1
Sample
cf2cec6f6651ef15115d0cacd781ef60N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf2cec6f6651ef15115d0cacd781ef60N.exe
Resource
win10v2004-20240802-en
General
-
Target
cf2cec6f6651ef15115d0cacd781ef60N.exe
-
Size
92KB
-
MD5
cf2cec6f6651ef15115d0cacd781ef60
-
SHA1
22fd12c2610045ce40b3e639b1c2d85dc0198a3b
-
SHA256
6b3b9ae3ab46266fd8a9cb431d9dbee6a8722a128c478b15351bed2fd336fe2d
-
SHA512
6b27b5061c866edc5fd46f308891c22a4b9fa2dbea9e8123bd0ac9f2385d5814c9071dfa3710c45c02fd277a2ce3d4bf22c6275589d2e902bedaa5ba711ed946
-
SSDEEP
1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrQ:9bfVk29te2jqxCEtg30BM
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023464-2.dat family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation cf2cec6f6651ef15115d0cacd781ef60N.exe -
Executes dropped EXE 1 IoCs
pid Process 3236 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" cf2cec6f6651ef15115d0cacd781ef60N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf2cec6f6651ef15115d0cacd781ef60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3396 cmd.exe 3744 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3744 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4080 cf2cec6f6651ef15115d0cacd781ef60N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4080 wrote to memory of 3236 4080 cf2cec6f6651ef15115d0cacd781ef60N.exe 83 PID 4080 wrote to memory of 3236 4080 cf2cec6f6651ef15115d0cacd781ef60N.exe 83 PID 4080 wrote to memory of 3236 4080 cf2cec6f6651ef15115d0cacd781ef60N.exe 83 PID 4080 wrote to memory of 3396 4080 cf2cec6f6651ef15115d0cacd781ef60N.exe 96 PID 4080 wrote to memory of 3396 4080 cf2cec6f6651ef15115d0cacd781ef60N.exe 96 PID 4080 wrote to memory of 3396 4080 cf2cec6f6651ef15115d0cacd781ef60N.exe 96 PID 3396 wrote to memory of 3744 3396 cmd.exe 98 PID 3396 wrote to memory of 3744 3396 cmd.exe 98 PID 3396 wrote to memory of 3744 3396 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf2cec6f6651ef15115d0cacd781ef60N.exe"C:\Users\Admin\AppData\Local\Temp\cf2cec6f6651ef15115d0cacd781ef60N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3236
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\cf2cec6f6651ef15115d0cacd781ef60N.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3744
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5b595fbec1dce87bcc1edc407c1dbc205
SHA159174f6bc5b0576bf32af7a9ff32dd6f806acafb
SHA25600bba9f9c5a0a1bdacd1dd27e0461a07a0ea1bd8470844aea6835ecb448aa7b5
SHA5123d3c2e2278725cbd4c811fb38267206f0355d5e78028255ec7ffc3ad8d43fc871fcde927af6d0e6dc1e115cc23e54b78800eb10b47e33f0861e5e3e9f487d561