Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 02:55
Static task
static1
Behavioral task
behavioral1
Sample
1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe
Resource
win10v2004-en-20220112
General
-
Target
1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe
-
Size
80KB
-
MD5
cbf6887e31b70ae67ad8e1b45d67e054
-
SHA1
2805f5c01d282328c70827b6d2add99a79b54b7f
-
SHA256
1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e
-
SHA512
cb8b5dd6af844c9cbf82c5227a4e76fa05c93f473b3273598fc847adcac0403f74a88e6ebc3a79c5a19fccc206c3b430b9338ff5dc71aa5f0de77abd8292d16d
Malware Config
Signatures
-
Sakula Payload 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 808 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 744 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exepid process 1520 1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe 1520 1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exedescription pid process Token: SeIncBasePriorityPrivilege 1520 1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.execmd.exedescription pid process target process PID 1520 wrote to memory of 808 1520 1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe MediaCenter.exe PID 1520 wrote to memory of 808 1520 1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe MediaCenter.exe PID 1520 wrote to memory of 808 1520 1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe MediaCenter.exe PID 1520 wrote to memory of 808 1520 1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe MediaCenter.exe PID 1520 wrote to memory of 744 1520 1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe cmd.exe PID 1520 wrote to memory of 744 1520 1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe cmd.exe PID 1520 wrote to memory of 744 1520 1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe cmd.exe PID 1520 wrote to memory of 744 1520 1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe cmd.exe PID 744 wrote to memory of 752 744 cmd.exe PING.EXE PID 744 wrote to memory of 752 744 cmd.exe PING.EXE PID 744 wrote to memory of 752 744 cmd.exe PING.EXE PID 744 wrote to memory of 752 744 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe"C:\Users\Admin\AppData\Local\Temp\1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\1912135c2148112514ed319adcfb652a9dd4a46b8e172ec9c3eaf19c153f5b0e.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
5aa1e7cc93b3416dd36c7bc2445f14ca
SHA11ce3effd7aed9849f340389eda57e51603f41ed9
SHA2568b0e25c2f483295b19f89283d74fdbb967491c3ad5a06e7fbeb3681b66a4a2e5
SHA512fd899495140929631fc90ccf9548b75da01a722c0d975dfe1ce0c141e96a7e19541ca1d848657775e905fc6a9a4c3d8e1a9bf009b14c33c86def3537b4afd15e
-
MD5
5aa1e7cc93b3416dd36c7bc2445f14ca
SHA11ce3effd7aed9849f340389eda57e51603f41ed9
SHA2568b0e25c2f483295b19f89283d74fdbb967491c3ad5a06e7fbeb3681b66a4a2e5
SHA512fd899495140929631fc90ccf9548b75da01a722c0d975dfe1ce0c141e96a7e19541ca1d848657775e905fc6a9a4c3d8e1a9bf009b14c33c86def3537b4afd15e
-
MD5
5aa1e7cc93b3416dd36c7bc2445f14ca
SHA11ce3effd7aed9849f340389eda57e51603f41ed9
SHA2568b0e25c2f483295b19f89283d74fdbb967491c3ad5a06e7fbeb3681b66a4a2e5
SHA512fd899495140929631fc90ccf9548b75da01a722c0d975dfe1ce0c141e96a7e19541ca1d848657775e905fc6a9a4c3d8e1a9bf009b14c33c86def3537b4afd15e