Analysis
-
max time kernel
98s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 14:16
Behavioral task
behavioral1
Sample
995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe
Resource
win10v2004-20241007-en
General
-
Target
995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe
-
Size
102KB
-
MD5
a6d8bdd039c8ae93ef9215a3e371e7da
-
SHA1
1a223de3b1143e0ccd722cfcae1b11945be8d9ca
-
SHA256
0c77f38e48d8a180666eb7586627c2823a7feb94a8a9c60be5001ebc400bbd0e
-
SHA512
2df3e4b6bce7102d10a413b60601eafe6e2e3cd8f6599db08e320537c4a3b68e0bf06f9afab2229d3353a69ddfd75c47dcff6d1d58c77c03ee1fe211b665e918
-
SSDEEP
1536:jJbCiJVkgMaT2itTkjoRXnM48dXFajVPkPLnlxsz30rtrQ39z:tbfVk29te2juPLlxo30Bs39z
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula family
-
Sakula payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3496-0-0x0000000000400000-0x000000000041C000-memory.dmp family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula behavioral2/memory/3496-5-0x0000000000400000-0x000000000041C000-memory.dmp family_sakula behavioral2/memory/836-6-0x0000000000400000-0x000000000041C000-memory.dmp family_sakula behavioral2/memory/3496-7-0x0000000000400000-0x000000000041C000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe -
Executes dropped EXE 1 IoCs
Processes:
AdobeUpdate.exepid process 836 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" 995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exePING.EXE995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exeAdobeUpdate.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 4552 cmd.exe 1680 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exedescription pid process Token: SeIncBasePriorityPrivilege 3496 995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.execmd.exedescription pid process target process PID 3496 wrote to memory of 836 3496 995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe AdobeUpdate.exe PID 3496 wrote to memory of 836 3496 995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe AdobeUpdate.exe PID 3496 wrote to memory of 836 3496 995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe AdobeUpdate.exe PID 3496 wrote to memory of 4552 3496 995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe cmd.exe PID 3496 wrote to memory of 4552 3496 995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe cmd.exe PID 3496 wrote to memory of 4552 3496 995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe cmd.exe PID 4552 wrote to memory of 1680 4552 cmd.exe PING.EXE PID 4552 wrote to memory of 1680 4552 cmd.exe PING.EXE PID 4552 wrote to memory of 1680 4552 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe"C:\Users\Admin\AppData\Local\Temp\995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1680
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5adb5059b17edeaaae7302dabba51ccfe
SHA13eff714c20259ca7a99de6b8aaccf658433b78bd
SHA256b45e453bd651aea5af03244271bb38da9d2f87a9bc87a5f88f0c4ad54e9c5369
SHA512ac71b9e339801d33c97b5f666c9875e2d9d2250b709d896cc1e6e408c3a0e582280755304f3e0c7ea69248f2c9e4c3c2b6eab3833fddffb057ffb453bf49e610