Analysis

  • max time kernel
    127s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 03:35

General

  • Target

    173af2eac22a725fba263869b74d122159dc2c88726bd4cd3903fd886619747b.exe

  • Size

    80KB

  • MD5

    c3b9c7da9478ef797e20c39f3eaca30f

  • SHA1

    95d76717ba0fbced700fd65e9777aa7b7ead131f

  • SHA256

    173af2eac22a725fba263869b74d122159dc2c88726bd4cd3903fd886619747b

  • SHA512

    7e103c54fab4bfb00360da06a79feca3ac0c53eaf6228fb027b7d26cfbfd718129f5abcbeebec1891913968616d49ccaf40f4a39f99e13f0bc004d58789a9539

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\173af2eac22a725fba263869b74d122159dc2c88726bd4cd3903fd886619747b.exe
    "C:\Users\Admin\AppData\Local\Temp\173af2eac22a725fba263869b74d122159dc2c88726bd4cd3903fd886619747b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:516
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:884
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\173af2eac22a725fba263869b74d122159dc2c88726bd4cd3903fd886619747b.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    6d0ce458d2eeee1c5718e10fba9a14e7

    SHA1

    a4c79ba07579386bb93b851553d3442f3792e0fe

    SHA256

    ef3fd04dcddd519acf397eea237abf4d80d408e33e69c74de2745c25c09977cf

    SHA512

    b2280e5a6c8515dd46c15d2408686dacda35030676a10271ac893c585536b2749be419510bc77cd01185a6dc9d79cf13d14f5f46f7e2c7c04f0adfeac8c9a0e1

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    6d0ce458d2eeee1c5718e10fba9a14e7

    SHA1

    a4c79ba07579386bb93b851553d3442f3792e0fe

    SHA256

    ef3fd04dcddd519acf397eea237abf4d80d408e33e69c74de2745c25c09977cf

    SHA512

    b2280e5a6c8515dd46c15d2408686dacda35030676a10271ac893c585536b2749be419510bc77cd01185a6dc9d79cf13d14f5f46f7e2c7c04f0adfeac8c9a0e1

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    6d0ce458d2eeee1c5718e10fba9a14e7

    SHA1

    a4c79ba07579386bb93b851553d3442f3792e0fe

    SHA256

    ef3fd04dcddd519acf397eea237abf4d80d408e33e69c74de2745c25c09977cf

    SHA512

    b2280e5a6c8515dd46c15d2408686dacda35030676a10271ac893c585536b2749be419510bc77cd01185a6dc9d79cf13d14f5f46f7e2c7c04f0adfeac8c9a0e1

  • memory/516-55-0x0000000075191000-0x0000000075193000-memory.dmp

    Filesize

    8KB