Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    30-01-2022 23:58

General

  • Target

    ada21030c1ba9014e72f08de9974b947091bec01855411743042f75c81d4f2b3.exe

  • Size

    89KB

  • MD5

    2ff61b170821191c99d8b75bd01726f2

  • SHA1

    320cf1c0efad979d0028f504f7274bbc7790fdde

  • SHA256

    ada21030c1ba9014e72f08de9974b947091bec01855411743042f75c81d4f2b3

  • SHA512

    c66e64652cef2fe5fee8dcf71742aa25389627eff4eee1d7e6270d41e01a62c286b74e7bf04aa496af94aad182cde292358e249f17e6704c9d17cbc9df51b517

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ada21030c1ba9014e72f08de9974b947091bec01855411743042f75c81d4f2b3.exe
    "C:\Users\Admin\AppData\Local\Temp\ada21030c1ba9014e72f08de9974b947091bec01855411743042f75c81d4f2b3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:268
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\ada21030c1ba9014e72f08de9974b947091bec01855411743042f75c81d4f2b3.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1048

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    ef70e2f63ee322e4f9ba884751ddfc65

    SHA1

    44be0a46bcec53093737db85df0bcf3839fc8bc9

    SHA256

    e84b6d79d41cb889712f62c0406a53eaf8ca0bed323fbec871823ad396672729

    SHA512

    5517d0addcf4e40b89e4227aa4c77360656e13bcefc02bd111e64003a8138ca00a72e57aa2e0354c52444d56aa6e491df88f8591c26aebe892e547b6da6a6c1f

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    ef70e2f63ee322e4f9ba884751ddfc65

    SHA1

    44be0a46bcec53093737db85df0bcf3839fc8bc9

    SHA256

    e84b6d79d41cb889712f62c0406a53eaf8ca0bed323fbec871823ad396672729

    SHA512

    5517d0addcf4e40b89e4227aa4c77360656e13bcefc02bd111e64003a8138ca00a72e57aa2e0354c52444d56aa6e491df88f8591c26aebe892e547b6da6a6c1f

  • memory/1860-54-0x0000000075891000-0x0000000075893000-memory.dmp

    Filesize

    8KB