Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 14:50
Behavioral task
behavioral1
Sample
34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe
Resource
win10v2004-20241007-en
General
-
Target
34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe
-
Size
92KB
-
MD5
c476a5590760e8d9705ef8c743140d30
-
SHA1
12042365157c609da58e6d437bea556adc905d65
-
SHA256
34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120
-
SHA512
2b75ee388567268fa9caeb582aee376b04b4dd6367f79354fe81b405470ed865caae787828300a9efea5902b3f1bff0358b7af42bff73fbb2a9b88d3487d868d
-
SSDEEP
1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrn:9bfVk29te2jqxCEtg30BL
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula family
-
Sakula payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023c7a-2.dat family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe -
Executes dropped EXE 1 IoCs
pid Process 1532 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" 34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5108 cmd.exe 2184 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2184 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 940 34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 940 wrote to memory of 1532 940 34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe 82 PID 940 wrote to memory of 1532 940 34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe 82 PID 940 wrote to memory of 1532 940 34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe 82 PID 940 wrote to memory of 5108 940 34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe 91 PID 940 wrote to memory of 5108 940 34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe 91 PID 940 wrote to memory of 5108 940 34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe 91 PID 5108 wrote to memory of 2184 5108 cmd.exe 93 PID 5108 wrote to memory of 2184 5108 cmd.exe 93 PID 5108 wrote to memory of 2184 5108 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe"C:\Users\Admin\AppData\Local\Temp\34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\34740d187213ea7125ff671c523d615fede95ad995da848f88efe832eb768120N.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2184
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52a17da5800e2b1c0e3b7f56989708e0d
SHA1fd8a5ddd09f3ec567672c1fbe11c86ecfdc85dc3
SHA2563b73118296d3c49a2669fcc0d8a475a84c1e11892529c426567bd56af51a28cf
SHA51270830da05e9f7427043f1fc37b2dc1b5a12b3046f5dbef07e023728f01d9f41d9fba470a95a3c7bd3997163f5c0d4478d28fc22c88f923dd8a39f19df3d8d8a1