618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf
618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe
517KB
24-09-2021 06:15
c00d8e2e994ce0664b89481518c2376e
8076dbd4cf89f4ddf0fa5f8f90b7664eca6312c2
618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf
Filter: none
-
Sakula
Description
Sakula is a remote access trojan with various capabilities.
Tags
-
Sakula Payload
Reported IOCs
resource yara_rule behavioral1/files/0x00040000000130b8-60.dat family_sakula behavioral1/files/0x00040000000130b8-62.dat family_sakula -
Executes dropped EXEMediaCenter.exe
Reported IOCs
pid process 2000 MediaCenter.exe -
Deletes itselfcmd.exe
Reported IOCs
pid process 1468 cmd.exe -
Loads dropped DLL618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe
Reported IOCs
pid process 1972 618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe -
Adds Run key to start application618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe
Tags
TTPs
Reported IOCs
description ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe -
Enumerates physical storage devices
Description
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
TTPs
-
Runs ping.exePING.EXE
TTPs
Reported IOCs
pid process 1740 PING.EXE -
Suspicious use of AdjustPrivilegeToken618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe
Reported IOCs
description pid process Token: SeIncBasePriorityPrivilege 1972 618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe -
Suspicious use of WriteProcessMemory618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.execmd.exe
Reported IOCs
description pid process target process PID 1972 wrote to memory of 2000 1972 618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe MediaCenter.exe PID 1972 wrote to memory of 2000 1972 618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe MediaCenter.exe PID 1972 wrote to memory of 2000 1972 618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe MediaCenter.exe PID 1972 wrote to memory of 2000 1972 618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe MediaCenter.exe PID 1972 wrote to memory of 1468 1972 618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe cmd.exe PID 1972 wrote to memory of 1468 1972 618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe cmd.exe PID 1972 wrote to memory of 1468 1972 618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe cmd.exe PID 1972 wrote to memory of 1468 1972 618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe cmd.exe PID 1468 wrote to memory of 1740 1468 cmd.exe PING.EXE PID 1468 wrote to memory of 1740 1468 cmd.exe PING.EXE PID 1468 wrote to memory of 1740 1468 cmd.exe PING.EXE PID 1468 wrote to memory of 1740 1468 cmd.exe PING.EXE
-
C:\Users\Admin\AppData\Local\Temp\618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe"C:\Users\Admin\AppData\Local\Temp\618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe"Loads dropped DLLAdds Run key to start applicationSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeExecutes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\618733a0c26f169b157e50c683a327f836ef8db6f13d7d0b94f0dd432030eacf.exe"Deletes itselfSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
MD56fb01a3fa8a8a04b30e5777cb0056ce1
SHA167590a2093b2e5b8e9d57d78ed9efc90dad394d1
SHA2565f26f9e834d67124c819d9f94caa9067b850b39b29c6e5bbf1d40a5ed21aa282
SHA5121fadf067b4ad46d6ab4c0c543e371ba506921dcc4639f00f81da11b3fb92dcedeae2e5e65f7171de145099de7e5de1f79a8e1158aca05709fa831bf3f2b39f3c
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
MD56fb01a3fa8a8a04b30e5777cb0056ce1
SHA167590a2093b2e5b8e9d57d78ed9efc90dad394d1
SHA2565f26f9e834d67124c819d9f94caa9067b850b39b29c6e5bbf1d40a5ed21aa282
SHA5121fadf067b4ad46d6ab4c0c543e371ba506921dcc4639f00f81da11b3fb92dcedeae2e5e65f7171de145099de7e5de1f79a8e1158aca05709fa831bf3f2b39f3c
-
memory/1468-64-0x0000000000000000-mapping.dmp
-
memory/1740-65-0x0000000000000000-mapping.dmp
-
memory/1972-59-0x0000000076A01000-0x0000000076A03000-memory.dmp
-
memory/2000-61-0x0000000000000000-mapping.dmp