Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    30-01-2022 18:49

General

  • Target

    7db237e3a169dd27b3dfb17387f680d84f34a273b6cb3607d23847ca3fe76755.exe

  • Size

    89KB

  • MD5

    567a33e09af45123678042e620f31769

  • SHA1

    8b18f58434111d96fd9139bdb05530b5f70239c1

  • SHA256

    7db237e3a169dd27b3dfb17387f680d84f34a273b6cb3607d23847ca3fe76755

  • SHA512

    180160ff1bca472d0805faba09dae05e7675bf59d10efa95ecb188936821adda60bb319e6e42d14d947998c2ef776e0abe4559c320bc1537bbc1b5e8c0332bec

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7db237e3a169dd27b3dfb17387f680d84f34a273b6cb3607d23847ca3fe76755.exe
    "C:\Users\Admin\AppData\Local\Temp\7db237e3a169dd27b3dfb17387f680d84f34a273b6cb3607d23847ca3fe76755.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1304
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\7db237e3a169dd27b3dfb17387f680d84f34a273b6cb3607d23847ca3fe76755.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    7199e5b08cf4e29194793313945d07f5

    SHA1

    96b459cbff7be31b20ee6934ef5c9ea84f7946bb

    SHA256

    b35b4d7bdab2feba538977a72814dff7add22dfcb5a4d7a8054e90e883258a4a

    SHA512

    62a8f2a1af7ea94678170a8e62218dfca425a71cebb0524af762f423ddd3b21fef58720c9a664531f1d44c8f38cfed7aba76486ad014113ba515e67746558365

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    7199e5b08cf4e29194793313945d07f5

    SHA1

    96b459cbff7be31b20ee6934ef5c9ea84f7946bb

    SHA256

    b35b4d7bdab2feba538977a72814dff7add22dfcb5a4d7a8054e90e883258a4a

    SHA512

    62a8f2a1af7ea94678170a8e62218dfca425a71cebb0524af762f423ddd3b21fef58720c9a664531f1d44c8f38cfed7aba76486ad014113ba515e67746558365

  • memory/964-54-0x0000000075F91000-0x0000000075F93000-memory.dmp

    Filesize

    8KB