Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 23:08
Behavioral task
behavioral1
Sample
701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe
Resource
win10v2004-20241007-en
General
-
Target
701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe
-
Size
92KB
-
MD5
ed3990ed84f5825b6ca1874b7b1df0b5
-
SHA1
b5a2bbfd860f8ba4d312b397fa31fb9b0cf9dc46
-
SHA256
701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba
-
SHA512
5d00d1aac2019710ea5fdf707296324101a470c0f5f47363b86a1b05230201798cf2623d10e923f283d3536a7dc50afc9a72f60dbd7070349200da368d8a6eef
-
SSDEEP
1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrU:9bfVk29te2jqxCEtg30BA
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula family
-
Sakula payload 1 IoCs
resource yara_rule behavioral1/files/0x0006000000019246-1.dat family_sakula -
Deletes itself 1 IoCs
pid Process 3056 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2740 AdobeUpdate.exe -
Loads dropped DLL 4 IoCs
pid Process 1072 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe 2740 AdobeUpdate.exe 2740 AdobeUpdate.exe 2740 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3056 cmd.exe 2236 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2236 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1072 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2740 1072 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe 30 PID 1072 wrote to memory of 2740 1072 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe 30 PID 1072 wrote to memory of 2740 1072 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe 30 PID 1072 wrote to memory of 2740 1072 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe 30 PID 1072 wrote to memory of 2740 1072 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe 30 PID 1072 wrote to memory of 2740 1072 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe 30 PID 1072 wrote to memory of 2740 1072 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe 30 PID 1072 wrote to memory of 3056 1072 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe 32 PID 1072 wrote to memory of 3056 1072 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe 32 PID 1072 wrote to memory of 3056 1072 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe 32 PID 1072 wrote to memory of 3056 1072 701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe 32 PID 3056 wrote to memory of 2236 3056 cmd.exe 34 PID 3056 wrote to memory of 2236 3056 cmd.exe 34 PID 3056 wrote to memory of 2236 3056 cmd.exe 34 PID 3056 wrote to memory of 2236 3056 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe"C:\Users\Admin\AppData\Local\Temp\701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\701a3d070df542771929c33d2e0fd5ee32570ea319e2430e23da3448eed9edba.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2236
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5dc33cbb5d51d9b35992a0762b9b0bd15
SHA1b365ca98d0598131bbbbf334fe9bbe5a6d356ac8
SHA2565787dc59dc75cec2f55f2ccaa296e29a19a97280bc3c032b9259cbc3730c21ae
SHA5121558940db71ffb426279b49ccec9d8dfab1dc4e155ffd423179d42c61fa2cca3d40576e9a0615ab41baa7f23e6e8c8d7802a2b6032ead0141fdaf24cb15f3ccf