Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 00:21
Behavioral task
behavioral1
Sample
77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe
Resource
win10v2004-20241007-en
General
-
Target
77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe
-
Size
92KB
-
MD5
01eefcb5687595760d1537c4c57c53d0
-
SHA1
5684dbc69cfb6df95ab2573f3d5add842dd8dc1c
-
SHA256
77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831
-
SHA512
eea99864e031324cd58dd43683e9ab966cee6fb1a1bba9c7008780aace19ef94b727f3f69ea8615a1f22c88f9d5a78dbb6b8d114b7f4f258d41a6f3f69f6c817
-
SSDEEP
1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtr/:9bfVk29te2jqxCEtg30BL
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula family
-
Sakula payload 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe family_sakula -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2888 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
AdobeUpdate.exepid process 2348 AdobeUpdate.exe -
Loads dropped DLL 4 IoCs
Processes:
77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exeAdobeUpdate.exepid process 2324 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe 2348 AdobeUpdate.exe 2348 AdobeUpdate.exe 2348 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exeAdobeUpdate.execmd.exePING.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 2888 cmd.exe 1600 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exedescription pid process Token: SeIncBasePriorityPrivilege 2324 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.execmd.exedescription pid process target process PID 2324 wrote to memory of 2348 2324 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe AdobeUpdate.exe PID 2324 wrote to memory of 2348 2324 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe AdobeUpdate.exe PID 2324 wrote to memory of 2348 2324 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe AdobeUpdate.exe PID 2324 wrote to memory of 2348 2324 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe AdobeUpdate.exe PID 2324 wrote to memory of 2348 2324 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe AdobeUpdate.exe PID 2324 wrote to memory of 2348 2324 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe AdobeUpdate.exe PID 2324 wrote to memory of 2348 2324 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe AdobeUpdate.exe PID 2324 wrote to memory of 2888 2324 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe cmd.exe PID 2324 wrote to memory of 2888 2324 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe cmd.exe PID 2324 wrote to memory of 2888 2324 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe cmd.exe PID 2324 wrote to memory of 2888 2324 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe cmd.exe PID 2888 wrote to memory of 1600 2888 cmd.exe PING.EXE PID 2888 wrote to memory of 1600 2888 cmd.exe PING.EXE PID 2888 wrote to memory of 1600 2888 cmd.exe PING.EXE PID 2888 wrote to memory of 1600 2888 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe"C:\Users\Admin\AppData\Local\Temp\77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1600
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD556fc94097a6f49c368dd4c57d2e9e450
SHA141c93f1a584b0cfd012a9ed02839c322bc037e90
SHA256d468092cf97dcb701b6c5b0383f2c14d263f9b591720990679c9fe381ad4e886
SHA5127d303f0934195814862e1bfec3cb30b4b30adecb44dbcff861c1e5ce880f918915f4aaa9415b2874c0930e9e9eb25c9d92d108f6c6a942656657c00df54b97cf