Analysis

  • max time kernel
    150s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 03:43

General

  • Target

    16eb538a72b038a5506091899b59e18bf0dc365069979d0eb852144d2b2b2801.exe

  • Size

    101KB

  • MD5

    95f3e2a13f2a70197810ac1ef4665678

  • SHA1

    f72ceab93969ef9dbc070875d4d2746d87eded11

  • SHA256

    16eb538a72b038a5506091899b59e18bf0dc365069979d0eb852144d2b2b2801

  • SHA512

    8cd460e2c75f49bc870a3041d7afc19bd84b5f3d76fba9e610f5ca1cd9c6016d0d76897d42e6f83f21260fca4a5c99e296f45aecd0ee547e8edecf4214056b17

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16eb538a72b038a5506091899b59e18bf0dc365069979d0eb852144d2b2b2801.exe
    "C:\Users\Admin\AppData\Local\Temp\16eb538a72b038a5506091899b59e18bf0dc365069979d0eb852144d2b2b2801.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:4420
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\16eb538a72b038a5506091899b59e18bf0dc365069979d0eb852144d2b2b2801.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:5060
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4996
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    b86cc97f028939aea5a0faa82071230c

    SHA1

    5c192dc36589fce61d40fcada8c01e98b51b83bd

    SHA256

    4ee697f634b142a4a20490fc5045a3a61a41acd9bdf488cfc5397f8db7644da1

    SHA512

    e9b2980cf2c5615a1ccd84a9593e614669913e5bd32be5ed148e10c7c8e1d61363ddc48c1eba244c510d66c6d366563e8f45fbcd4dbba2e6792778baa89f8777

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    b86cc97f028939aea5a0faa82071230c

    SHA1

    5c192dc36589fce61d40fcada8c01e98b51b83bd

    SHA256

    4ee697f634b142a4a20490fc5045a3a61a41acd9bdf488cfc5397f8db7644da1

    SHA512

    e9b2980cf2c5615a1ccd84a9593e614669913e5bd32be5ed148e10c7c8e1d61363ddc48c1eba244c510d66c6d366563e8f45fbcd4dbba2e6792778baa89f8777

  • memory/4996-132-0x000001987EB30000-0x000001987EB40000-memory.dmp

    Filesize

    64KB

  • memory/4996-133-0x000001987EB90000-0x000001987EBA0000-memory.dmp

    Filesize

    64KB

  • memory/4996-134-0x000001987F880000-0x000001987F884000-memory.dmp

    Filesize

    16KB