Analysis
-
max time kernel
133s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2024 13:26
Behavioral task
behavioral1
Sample
a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe
Resource
win10v2004-20241007-en
General
-
Target
a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe
-
Size
101KB
-
MD5
77d7d335c307086b4094ac4facd87d20
-
SHA1
949522519af2fbdf955522524f30b8767e18a667
-
SHA256
a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818e
-
SHA512
cbca06313c6fe0d5f32865dfc92821ff1481a6baa1101684ec7185e9ec3b71963f2db0040f39adf9a0019b6bd06bce815f77896dc4915be0b916ad1d971e0bde
-
SSDEEP
1536:9JbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrGPTEzV:/bfVk29te2jqxCEtg30BibEB
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula family
-
Sakula payload 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023cb6-3.dat family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe -
Executes dropped EXE 1 IoCs
pid Process 3676 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5080 cmd.exe 1396 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1396 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3784 a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3784 wrote to memory of 3676 3784 a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe 84 PID 3784 wrote to memory of 3676 3784 a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe 84 PID 3784 wrote to memory of 3676 3784 a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe 84 PID 3784 wrote to memory of 5080 3784 a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe 97 PID 3784 wrote to memory of 5080 3784 a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe 97 PID 3784 wrote to memory of 5080 3784 a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe 97 PID 5080 wrote to memory of 1396 5080 cmd.exe 99 PID 5080 wrote to memory of 1396 5080 cmd.exe 99 PID 5080 wrote to memory of 1396 5080 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe"C:\Users\Admin\AppData\Local\Temp\a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\a5af4417b8648cd57eca23d49447ca355b7502531d2b5366be71f0b66a3b818eN.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1396
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5703fdc593a06bcbd64453cc041a4978c
SHA101a07fdc9b871b075416073031b503418c770711
SHA256b1c70ca0dc0e0b040355f0c58f874b5c5cbc80dc05f58075d8ce83333ec1d437
SHA512ddee6f83b9e001956ccc8251fd01451e886c36d928415deb4407f99cb771aed08d0107082de7def3115bb63f24f4047b7aa6efb1e685a7e6f433fd4fa643af7b