bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348
bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe
150KB
22-09-2021 13:29
9640c0c25e279327d12a52a5e596724d
81efd5b75ec8e7e4fc5a063a2ab26bb1e21f8b4c
bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348
Filter: none
-
Sakula
Description
Sakula is a remote access trojan with various capabilities.
Tags
-
Sakula Payload
Reported IOCs
resource yara_rule behavioral1/files/0x00040000000130d3-61.dat family_sakula behavioral1/files/0x00040000000130d3-63.dat family_sakula -
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
Description
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
Tags
-
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
Description
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
Tags
-
Executes dropped EXEMediaCenter.exe
Reported IOCs
pid process 1864 MediaCenter.exe -
Deletes itselfcmd.exe
Reported IOCs
pid process 1724 cmd.exe -
Loads dropped DLLbf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe
Reported IOCs
pid process 1308 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe -
Adds Run key to start applicationbf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe
Tags
TTPs
Reported IOCs
description ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe -
Enumerates physical storage devices
Description
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
TTPs
-
Runs ping.exePING.EXE
TTPs
Reported IOCs
pid process 1780 PING.EXE -
Suspicious use of AdjustPrivilegeTokenbf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe
Reported IOCs
description pid process Token: SeIncBasePriorityPrivilege 1308 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe -
Suspicious use of WriteProcessMemorybf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.execmd.exe
Reported IOCs
description pid process target process PID 1308 wrote to memory of 1864 1308 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe MediaCenter.exe PID 1308 wrote to memory of 1864 1308 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe MediaCenter.exe PID 1308 wrote to memory of 1864 1308 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe MediaCenter.exe PID 1308 wrote to memory of 1864 1308 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe MediaCenter.exe PID 1308 wrote to memory of 1724 1308 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe cmd.exe PID 1308 wrote to memory of 1724 1308 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe cmd.exe PID 1308 wrote to memory of 1724 1308 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe cmd.exe PID 1308 wrote to memory of 1724 1308 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe cmd.exe PID 1724 wrote to memory of 1780 1724 cmd.exe PING.EXE PID 1724 wrote to memory of 1780 1724 cmd.exe PING.EXE PID 1724 wrote to memory of 1780 1724 cmd.exe PING.EXE PID 1724 wrote to memory of 1780 1724 cmd.exe PING.EXE
-
C:\Users\Admin\AppData\Local\Temp\bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe"C:\Users\Admin\AppData\Local\Temp\bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe"Loads dropped DLLAdds Run key to start applicationSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeExecutes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe"Deletes itselfSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
MD59e1c69bc4bff30d3a84eead5de8196ba
SHA1772f429ff6f34678dbfd6ee6d9ef4f446a98c58c
SHA25602fa201468ab8f2dbaa28a9004884f80e86631a2f5227c447c76935429377e48
SHA512acb88b4598c42897f15a876a5ac9523a567e65ded6e1b40b52644a65a1bf5b3731b6b18d5efe182eef091592b0a9638253b7ae3dbfdf4fdb4eb5f347da2b78d8
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
MD59e1c69bc4bff30d3a84eead5de8196ba
SHA1772f429ff6f34678dbfd6ee6d9ef4f446a98c58c
SHA25602fa201468ab8f2dbaa28a9004884f80e86631a2f5227c447c76935429377e48
SHA512acb88b4598c42897f15a876a5ac9523a567e65ded6e1b40b52644a65a1bf5b3731b6b18d5efe182eef091592b0a9638253b7ae3dbfdf4fdb4eb5f347da2b78d8
-
memory/1308-60-0x0000000075AD1000-0x0000000075AD3000-memory.dmp
-
memory/1724-65-0x0000000000000000-mapping.dmp
-
memory/1780-66-0x0000000000000000-mapping.dmp
-
memory/1864-62-0x0000000000000000-mapping.dmp