Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2025, 21:54

General

  • Target

    27a6258fa142ba5f896f905a05d4ece3c18ce33b62beb50318c9a488eb94f695N.exe

  • Size

    92KB

  • MD5

    26516562849e11703cb2f4b47f8e3a30

  • SHA1

    f09abd5d278427412d67c15b2b6fc34ccbfe71f1

  • SHA256

    27a6258fa142ba5f896f905a05d4ece3c18ce33b62beb50318c9a488eb94f695

  • SHA512

    0fb43e9b327644e684a024a3a0e3213bb6fcf8cef49a023e8779a949b408e8aff2ade3f98a25180b023d7624c6fabbf276d108b3f69222ccd4b5676d9e6b3810

  • SSDEEP

    1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrG:9bfVk29te2jqxCEtg30BK

Malware Config

Extracted

Family

sakula

C2

www.savmpet.com

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula family
  • Sakula payload 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27a6258fa142ba5f896f905a05d4ece3c18ce33b62beb50318c9a488eb94f695N.exe
    "C:\Users\Admin\AppData\Local\Temp\27a6258fa142ba5f896f905a05d4ece3c18ce33b62beb50318c9a488eb94f695N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2548
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\27a6258fa142ba5f896f905a05d4ece3c18ce33b62beb50318c9a488eb94f695N.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe

    Filesize

    92KB

    MD5

    f5ce5ef8a2fbb0e78a9009942f85f2bd

    SHA1

    95579f657ff4a20425234fb2e7b957bd251ac336

    SHA256

    e8f9223fed05bfb05f25c4cc60075be02c19af46ca6d3fe6d9c0995577755b46

    SHA512

    ffa2699f57b3f85c1d3bc47768473540d6aa25f7efb8acb585c5ed99ce286675ec72c65263e81e4cc8b2e63cf9d11cc29a962b02a6e4f51a380f4e92e953a914