Analysis
-
max time kernel
125s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 00:02
Behavioral task
behavioral1
Sample
6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe
Resource
win10v2004-20241007-en
General
-
Target
6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe
-
Size
92KB
-
MD5
6bcb7e376f390f2c439f0cdafa9cf67f
-
SHA1
c5e94ff3a9a017e19deb439bccd9885260b2b70a
-
SHA256
6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444
-
SHA512
18896a7e820551d3b70c34f609676b67d4fdb97403f3ae71f69fbdd36f7b16a26f9e79657d02d7f207e5f37035f9da24d72bd2e770e843e53992f451717c96eb
-
SSDEEP
1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrh:9bfVk29te2jqxCEtg30BF
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula family
-
Sakula payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023b71-2.dat family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe -
Executes dropped EXE 1 IoCs
pid Process 1508 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" 6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4364 cmd.exe 1652 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1652 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3984 6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3984 wrote to memory of 1508 3984 6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe 83 PID 3984 wrote to memory of 1508 3984 6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe 83 PID 3984 wrote to memory of 1508 3984 6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe 83 PID 3984 wrote to memory of 4364 3984 6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe 96 PID 3984 wrote to memory of 4364 3984 6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe 96 PID 3984 wrote to memory of 4364 3984 6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe 96 PID 4364 wrote to memory of 1652 4364 cmd.exe 98 PID 4364 wrote to memory of 1652 4364 cmd.exe 98 PID 4364 wrote to memory of 1652 4364 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe"C:\Users\Admin\AppData\Local\Temp\6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1508
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\6ba7293287645ba46d1f71b211ef8a7b7ff79af0e69a97efca70c2910cd5e444.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1652
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD51955f497e6d7a2bded210e4bb75278a2
SHA16a0f1183b2ab173ca564ae4f28a9223224359a65
SHA256433c897a8fb6b62494404d7cfab3a77c2e71c20c67bcdcff88735e4c6aac1dd2
SHA512894fbd78df3c18b27c60dbce9d7804873c3223fb4a51b386acc4765342684e48d266a6d689d6f3813c1d8cb1c80383edca68cc1f8391504f13176cc8dabaea3d