Analysis

  • max time kernel
    131s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 03:33

General

  • Target

    17582e12053169192de99961614e8895978d859d8571665754b4ded0283702e2.exe

  • Size

    92KB

  • MD5

    a81416c358133806902288e7c41d976b

  • SHA1

    c791cb19d17cf8d3959399eec9d680d446d43682

  • SHA256

    17582e12053169192de99961614e8895978d859d8571665754b4ded0283702e2

  • SHA512

    369cd433bc68eac60124550025fb727ca91b4184a8b6ebedf686de69bf5812b0e8543ca6b5f5ef2b693489d502908282658216b386b8bbc7932a2eb9bfa325a4

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17582e12053169192de99961614e8895978d859d8571665754b4ded0283702e2.exe
    "C:\Users\Admin\AppData\Local\Temp\17582e12053169192de99961614e8895978d859d8571665754b4ded0283702e2.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1892
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\17582e12053169192de99961614e8895978d859d8571665754b4ded0283702e2.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:684
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    97f2ce73d3ee9a66030f83305975214b

    SHA1

    1bedf5853888001e466e02a7adad352765900751

    SHA256

    eecc6ccecdb996638fb87538080e911cce415a79473e7b5201f5872bf2cb8a1b

    SHA512

    f520641d80553585742e4126c4559f07d6d3a43dae50db0d9798c88be500f4bbad1619c30f3289b46ac29ae574a7fa3479ca5bb19a09b08e8327327e65e59b8a

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    97f2ce73d3ee9a66030f83305975214b

    SHA1

    1bedf5853888001e466e02a7adad352765900751

    SHA256

    eecc6ccecdb996638fb87538080e911cce415a79473e7b5201f5872bf2cb8a1b

    SHA512

    f520641d80553585742e4126c4559f07d6d3a43dae50db0d9798c88be500f4bbad1619c30f3289b46ac29ae574a7fa3479ca5bb19a09b08e8327327e65e59b8a

  • memory/1308-53-0x0000000076071000-0x0000000076073000-memory.dmp

    Filesize

    8KB