Analysis

  • max time kernel
    119s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    30-01-2022 21:35

General

  • Target

    b8bc59f0a3c34720a5f47b2cf769548f9c057605a94fe5e06361bbeb9801641b.exe

  • Size

    126KB

  • MD5

    260349f5343244c439b211d9f9ff53cf

  • SHA1

    5fbf3ca23f97deb97647ace003308129eeeac1ce

  • SHA256

    b8bc59f0a3c34720a5f47b2cf769548f9c057605a94fe5e06361bbeb9801641b

  • SHA512

    1c75c910e387dc2b1f20d45b418e38bccf1211ae23acc7163b26b9ed73271443115f2a2c5bf95e26356e2eb8dac90cd17d6d337c1dc4f1e4bfa232a5e7749714

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 10 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8bc59f0a3c34720a5f47b2cf769548f9c057605a94fe5e06361bbeb9801641b.exe
    "C:\Users\Admin\AppData\Local\Temp\b8bc59f0a3c34720a5f47b2cf769548f9c057605a94fe5e06361bbeb9801641b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Users\Admin\AppData\Local\Temp\pdfforie.exe
      C:\Users\Admin\AppData\Local\Temp\pdfforie.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe
        C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:268
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\pdfforie.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1316
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:288
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.qzbwcq.com/cookie.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:576
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:576 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe

    MD5

    c8c432b8790f926d289596b3962a7c82

    SHA1

    417af479901efcbba091a8ca4eafb9c05c33c35e

    SHA256

    d016ab6695dd0b03b0df05cca09bff0274e4ef8dee2f6ea1085ac4debcf2b0a1

    SHA512

    11f6025a5fc77983ee2216806c964c08dce521ddd6285d87cc88b69036ea4ed854a06a5372748d9541b205470f5c6a61508c15dfa7ddd98ee05e8e8def3f1c1d

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe

    MD5

    c8c432b8790f926d289596b3962a7c82

    SHA1

    417af479901efcbba091a8ca4eafb9c05c33c35e

    SHA256

    d016ab6695dd0b03b0df05cca09bff0274e4ef8dee2f6ea1085ac4debcf2b0a1

    SHA512

    11f6025a5fc77983ee2216806c964c08dce521ddd6285d87cc88b69036ea4ed854a06a5372748d9541b205470f5c6a61508c15dfa7ddd98ee05e8e8def3f1c1d

  • C:\Users\Admin\AppData\Local\Temp\pdfforie.exe

    MD5

    191696982f3f21a6ac31bf3549c94108

    SHA1

    b28806efad1136d03a4e6f34ed9d826fd828b535

    SHA256

    22f5fa60c2286e22bee79bcde6e9c7ee80b42ef308c6bb7aed6d6163e5da0214

    SHA512

    aa6d79fbce14f68e47dd7719e7dcb688dfd72b63db4e8ad3976351494df7221684621468380828c1aeca9f77c1156c8317524ee972696225c0d9be0dde8815ee

  • C:\Users\Admin\AppData\Local\Temp\pdfforie.exe

    MD5

    191696982f3f21a6ac31bf3549c94108

    SHA1

    b28806efad1136d03a4e6f34ed9d826fd828b535

    SHA256

    22f5fa60c2286e22bee79bcde6e9c7ee80b42ef308c6bb7aed6d6163e5da0214

    SHA512

    aa6d79fbce14f68e47dd7719e7dcb688dfd72b63db4e8ad3976351494df7221684621468380828c1aeca9f77c1156c8317524ee972696225c0d9be0dde8815ee

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AYYU6W7T.txt

    MD5

    7aa1bbda65f46b885f75792d964334f7

    SHA1

    2fad57b99fe363cee17d88ff2bbe6ebdd95715c3

    SHA256

    4049ac5f5eb6ccb9edb4e180318edf60a43669c1b8caa36cb001eb960a360609

    SHA512

    61bad87803a9db1c497095ec5a7066b349d4c38f2c9eee39d72251816fc48a89c769c643361df1d79c37d80d77bf8c10f3324054b4131a59abe645ebecf2348a

  • \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe

    MD5

    c8c432b8790f926d289596b3962a7c82

    SHA1

    417af479901efcbba091a8ca4eafb9c05c33c35e

    SHA256

    d016ab6695dd0b03b0df05cca09bff0274e4ef8dee2f6ea1085ac4debcf2b0a1

    SHA512

    11f6025a5fc77983ee2216806c964c08dce521ddd6285d87cc88b69036ea4ed854a06a5372748d9541b205470f5c6a61508c15dfa7ddd98ee05e8e8def3f1c1d

  • \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe

    MD5

    c8c432b8790f926d289596b3962a7c82

    SHA1

    417af479901efcbba091a8ca4eafb9c05c33c35e

    SHA256

    d016ab6695dd0b03b0df05cca09bff0274e4ef8dee2f6ea1085ac4debcf2b0a1

    SHA512

    11f6025a5fc77983ee2216806c964c08dce521ddd6285d87cc88b69036ea4ed854a06a5372748d9541b205470f5c6a61508c15dfa7ddd98ee05e8e8def3f1c1d

  • \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe

    MD5

    c8c432b8790f926d289596b3962a7c82

    SHA1

    417af479901efcbba091a8ca4eafb9c05c33c35e

    SHA256

    d016ab6695dd0b03b0df05cca09bff0274e4ef8dee2f6ea1085ac4debcf2b0a1

    SHA512

    11f6025a5fc77983ee2216806c964c08dce521ddd6285d87cc88b69036ea4ed854a06a5372748d9541b205470f5c6a61508c15dfa7ddd98ee05e8e8def3f1c1d

  • \Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe

    MD5

    c8c432b8790f926d289596b3962a7c82

    SHA1

    417af479901efcbba091a8ca4eafb9c05c33c35e

    SHA256

    d016ab6695dd0b03b0df05cca09bff0274e4ef8dee2f6ea1085ac4debcf2b0a1

    SHA512

    11f6025a5fc77983ee2216806c964c08dce521ddd6285d87cc88b69036ea4ed854a06a5372748d9541b205470f5c6a61508c15dfa7ddd98ee05e8e8def3f1c1d

  • \Users\Admin\AppData\Local\Temp\pdfforie.exe

    MD5

    191696982f3f21a6ac31bf3549c94108

    SHA1

    b28806efad1136d03a4e6f34ed9d826fd828b535

    SHA256

    22f5fa60c2286e22bee79bcde6e9c7ee80b42ef308c6bb7aed6d6163e5da0214

    SHA512

    aa6d79fbce14f68e47dd7719e7dcb688dfd72b63db4e8ad3976351494df7221684621468380828c1aeca9f77c1156c8317524ee972696225c0d9be0dde8815ee

  • \Users\Admin\AppData\Local\Temp\pdfforie.exe

    MD5

    191696982f3f21a6ac31bf3549c94108

    SHA1

    b28806efad1136d03a4e6f34ed9d826fd828b535

    SHA256

    22f5fa60c2286e22bee79bcde6e9c7ee80b42ef308c6bb7aed6d6163e5da0214

    SHA512

    aa6d79fbce14f68e47dd7719e7dcb688dfd72b63db4e8ad3976351494df7221684621468380828c1aeca9f77c1156c8317524ee972696225c0d9be0dde8815ee

  • memory/1548-57-0x0000000076491000-0x0000000076493000-memory.dmp

    Filesize

    8KB