Analysis

  • max time kernel
    165s
  • max time network
    176s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    30-01-2022 19:16

General

  • Target

    641b225c6954c05482069a7b808b24ab8c9dc8c95790d8cf8f4c63d9ebbd6fec.exe

  • Size

    290KB

  • MD5

    4f545dff49f81d08736a782751450f71

  • SHA1

    ad82ab937e28a6ddba4a837684185255b26d35ab

  • SHA256

    641b225c6954c05482069a7b808b24ab8c9dc8c95790d8cf8f4c63d9ebbd6fec

  • SHA512

    b62d97e2c8e189020d2d736e449bf1d148b4f97e4f0f16141fcc78a37f5148d75cf5929e1da43492660f9c10261f180dd6af1dfd407470c171ef7faced7d1fb2

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\641b225c6954c05482069a7b808b24ab8c9dc8c95790d8cf8f4c63d9ebbd6fec.exe
    "C:\Users\Admin\AppData\Local\Temp\641b225c6954c05482069a7b808b24ab8c9dc8c95790d8cf8f4c63d9ebbd6fec.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Roaming\SensrSvc2013.exe
      C:\Users\Admin\AppData\Roaming\SensrSvc2013.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:800
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\641B22~1.EXE > nul
      2⤵
        PID:980

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\SensrSvc2013.exe

      MD5

      4f545dff49f81d08736a782751450f71

      SHA1

      ad82ab937e28a6ddba4a837684185255b26d35ab

      SHA256

      641b225c6954c05482069a7b808b24ab8c9dc8c95790d8cf8f4c63d9ebbd6fec

      SHA512

      b62d97e2c8e189020d2d736e449bf1d148b4f97e4f0f16141fcc78a37f5148d75cf5929e1da43492660f9c10261f180dd6af1dfd407470c171ef7faced7d1fb2

    • C:\Users\Admin\AppData\Roaming\SensrSvc2013.exe

      MD5

      4f545dff49f81d08736a782751450f71

      SHA1

      ad82ab937e28a6ddba4a837684185255b26d35ab

      SHA256

      641b225c6954c05482069a7b808b24ab8c9dc8c95790d8cf8f4c63d9ebbd6fec

      SHA512

      b62d97e2c8e189020d2d736e449bf1d148b4f97e4f0f16141fcc78a37f5148d75cf5929e1da43492660f9c10261f180dd6af1dfd407470c171ef7faced7d1fb2

    • memory/800-127-0x0000000000570000-0x00000000006BA000-memory.dmp

      Filesize

      1.3MB

    • memory/3632-118-0x0000000001140000-0x000000000128A000-memory.dmp

      Filesize

      1.3MB

    • memory/3632-119-0x0000000010000000-0x000000001001F000-memory.dmp

      Filesize

      124KB