Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    30-01-2022 20:18

General

  • Target

    b719bca6ade9b83bbadd435e49f5a7c43e586b112ac3f342ca37daaa01ace9bb.exe

  • Size

    89KB

  • MD5

    416e831d583665352fe16fe9232d36cf

  • SHA1

    50e7b4d4f3ab5fa9c77c0286213e7980ed52f6f6

  • SHA256

    b719bca6ade9b83bbadd435e49f5a7c43e586b112ac3f342ca37daaa01ace9bb

  • SHA512

    49ce4109c6564507c44ff2b6881d560522900a2e564fce834e9a645d526d0853288ca5a4c348caf4570ef03eee2a26fee263de06a3f23f1979cb532f82399cc0

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b719bca6ade9b83bbadd435e49f5a7c43e586b112ac3f342ca37daaa01ace9bb.exe
    "C:\Users\Admin\AppData\Local\Temp\b719bca6ade9b83bbadd435e49f5a7c43e586b112ac3f342ca37daaa01ace9bb.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1332
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\b719bca6ade9b83bbadd435e49f5a7c43e586b112ac3f342ca37daaa01ace9bb.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1156
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    69c7e5b9ecfb43e48e4c5c9642e0e9fd

    SHA1

    4c414d05acc5ac8253326e2776ed69ff56a72330

    SHA256

    4d151701d07cdb3a4df0318f1c2ab7e282d7e1c97b4dd7275ffad90cd777cb0c

    SHA512

    88aaf5a17e173e5db86705d7f8c64c128e8d73865f4509d34f9fbfdc92efc0d7dc24b1cfa15992664870f70d45b4abbf8e648475dbb00464bb4ca25a982b28b6

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    69c7e5b9ecfb43e48e4c5c9642e0e9fd

    SHA1

    4c414d05acc5ac8253326e2776ed69ff56a72330

    SHA256

    4d151701d07cdb3a4df0318f1c2ab7e282d7e1c97b4dd7275ffad90cd777cb0c

    SHA512

    88aaf5a17e173e5db86705d7f8c64c128e8d73865f4509d34f9fbfdc92efc0d7dc24b1cfa15992664870f70d45b4abbf8e648475dbb00464bb4ca25a982b28b6

  • memory/948-55-0x0000000075F91000-0x0000000075F93000-memory.dmp

    Filesize

    8KB