Analysis
-
max time kernel
125s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 00:21
Behavioral task
behavioral1
Sample
77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe
Resource
win10v2004-20241007-en
General
-
Target
77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe
-
Size
92KB
-
MD5
01eefcb5687595760d1537c4c57c53d0
-
SHA1
5684dbc69cfb6df95ab2573f3d5add842dd8dc1c
-
SHA256
77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831
-
SHA512
eea99864e031324cd58dd43683e9ab966cee6fb1a1bba9c7008780aace19ef94b727f3f69ea8615a1f22c88f9d5a78dbb6b8d114b7f4f258d41a6f3f69f6c817
-
SSDEEP
1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtr/:9bfVk29te2jqxCEtg30BL
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula family
-
Sakula payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b97-2.dat family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe -
Executes dropped EXE 1 IoCs
pid Process 4616 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4248 cmd.exe 3820 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3820 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1396 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1396 wrote to memory of 4616 1396 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe 82 PID 1396 wrote to memory of 4616 1396 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe 82 PID 1396 wrote to memory of 4616 1396 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe 82 PID 1396 wrote to memory of 4248 1396 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe 91 PID 1396 wrote to memory of 4248 1396 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe 91 PID 1396 wrote to memory of 4248 1396 77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe 91 PID 4248 wrote to memory of 3820 4248 cmd.exe 93 PID 4248 wrote to memory of 3820 4248 cmd.exe 93 PID 4248 wrote to memory of 3820 4248 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe"C:\Users\Admin\AppData\Local\Temp\77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4616
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\77341cd774cde67b5e443a7a012b2bc91748e1b0d7b30b511fc68d9146e20831.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3820
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5751e12d3204423c83786bc71f88b9f90
SHA1a9104c2f4345f475d130d4cae4a4a9acfef28998
SHA2568cf835fcc18f4967ae1e2fa82925c529ae9554acef6bf3032ab943292fd5a7d3
SHA512e1cd8092b447fdd467029c26c7650a7e82a8201deeea1147c9467f66d4c73d36d8b6fb8e284c6243abbafb5b69cbadff979eae34d43c84477b07a60fe456b34f