Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
30-01-2022 19:19
Static task
static1
Behavioral task
behavioral1
Sample
a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe
Resource
win10-en-20211208
General
-
Target
a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe
-
Size
117KB
-
MD5
4ea3afbed7a0c7d0013f454060243fba
-
SHA1
cc5b48da0b8aa02d75c6a5b3bb5be2e9f7a5b80d
-
SHA256
a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b
-
SHA512
553f3a59cce423c8686edac1ddd29ef452b87fcd36b2e9ba8a1793f00e1661a38fcc50426a394412a416f43eeb3dba74451331b9a2ccf8efe268e08861a27dd2
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1712-55-0x0000000010000000-0x000000001001F000-memory.dmp family_sakula behavioral1/memory/1712-66-0x0000000000020000-0x000000000003D000-memory.dmp family_sakula -
Executes dropped EXE 1 IoCs
Processes:
SensrSvc2013.exepid process 820 SensrSvc2013.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1364 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exepid process 1712 a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe 1712 a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
SensrSvc2013.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SenseSvc = "C:\\Users\\Admin\\AppData\\Roaming\\SensrSvc2013.exe" SensrSvc2013.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exedescription pid process Token: SeIncBasePriorityPrivilege 1712 a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exedescription pid process target process PID 1712 wrote to memory of 820 1712 a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe SensrSvc2013.exe PID 1712 wrote to memory of 820 1712 a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe SensrSvc2013.exe PID 1712 wrote to memory of 820 1712 a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe SensrSvc2013.exe PID 1712 wrote to memory of 820 1712 a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe SensrSvc2013.exe PID 1712 wrote to memory of 1364 1712 a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe cmd.exe PID 1712 wrote to memory of 1364 1712 a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe cmd.exe PID 1712 wrote to memory of 1364 1712 a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe cmd.exe PID 1712 wrote to memory of 1364 1712 a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe"C:\Users\Admin\AppData\Local\Temp\a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Roaming\SensrSvc2013.exeC:\Users\Admin\AppData\Roaming\SensrSvc2013.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\A99EC6~1.EXE > nul2⤵
- Deletes itself
PID:1364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4ea3afbed7a0c7d0013f454060243fba
SHA1cc5b48da0b8aa02d75c6a5b3bb5be2e9f7a5b80d
SHA256a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b
SHA512553f3a59cce423c8686edac1ddd29ef452b87fcd36b2e9ba8a1793f00e1661a38fcc50426a394412a416f43eeb3dba74451331b9a2ccf8efe268e08861a27dd2
-
MD5
4ea3afbed7a0c7d0013f454060243fba
SHA1cc5b48da0b8aa02d75c6a5b3bb5be2e9f7a5b80d
SHA256a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b
SHA512553f3a59cce423c8686edac1ddd29ef452b87fcd36b2e9ba8a1793f00e1661a38fcc50426a394412a416f43eeb3dba74451331b9a2ccf8efe268e08861a27dd2
-
MD5
4ea3afbed7a0c7d0013f454060243fba
SHA1cc5b48da0b8aa02d75c6a5b3bb5be2e9f7a5b80d
SHA256a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b
SHA512553f3a59cce423c8686edac1ddd29ef452b87fcd36b2e9ba8a1793f00e1661a38fcc50426a394412a416f43eeb3dba74451331b9a2ccf8efe268e08861a27dd2
-
MD5
4ea3afbed7a0c7d0013f454060243fba
SHA1cc5b48da0b8aa02d75c6a5b3bb5be2e9f7a5b80d
SHA256a99ec6d2b109d3887a585bdf48f337ef2901bc185f4a51230100a60463c59e0b
SHA512553f3a59cce423c8686edac1ddd29ef452b87fcd36b2e9ba8a1793f00e1661a38fcc50426a394412a416f43eeb3dba74451331b9a2ccf8efe268e08861a27dd2