Analysis
-
max time kernel
153s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
12-02-2022 02:57
Static task
static1
Behavioral task
behavioral1
Sample
18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe
Resource
win10v2004-en-20220112
General
-
Target
18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe
-
Size
89KB
-
MD5
60b419cc2f0b4d5467429473cfae2f69
-
SHA1
38acdfdbc1c09915f452693e0a1a1c756694d4a1
-
SHA256
18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3
-
SHA512
cfe9baa00cb44072bb8400d2eac67720dbeb3c2a80ce9bb870844b77bf16c877ef22cb7d0ec1019e24ebe91bb68ae1db9c4a72bb03f25f33defbe4f9eee0e7a3
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral2/memory/3592-132-0x0000000000400000-0x000000000041B000-memory.dmp family_sakula behavioral2/memory/1552-133-0x0000000000400000-0x000000000041B000-memory.dmp family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1552 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe -
Drops file in Windows directory 2 IoCs
Processes:
TiWorker.exedescription ioc process File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe -
Modifies data under HKEY_USERS 46 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "3.124917" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "3692" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.218914" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "3664" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exeTiWorker.exedescription pid process Token: SeIncBasePriorityPrivilege 3592 18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe Token: SeBackupPrivilege 2436 TiWorker.exe Token: SeRestorePrivilege 2436 TiWorker.exe Token: SeSecurityPrivilege 2436 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.execmd.exedescription pid process target process PID 3592 wrote to memory of 1552 3592 18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe MediaCenter.exe PID 3592 wrote to memory of 1552 3592 18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe MediaCenter.exe PID 3592 wrote to memory of 1552 3592 18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe MediaCenter.exe PID 3592 wrote to memory of 1380 3592 18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe cmd.exe PID 3592 wrote to memory of 1380 3592 18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe cmd.exe PID 3592 wrote to memory of 1380 3592 18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe cmd.exe PID 1380 wrote to memory of 1780 1380 cmd.exe PING.EXE PID 1380 wrote to memory of 1780 1380 cmd.exe PING.EXE PID 1380 wrote to memory of 1780 1380 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe"C:\Users\Admin\AppData\Local\Temp\18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\18f4e140e1ec580fb96108e23d2f4d7359dd2942f84731850237a76d732ba0a3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1780
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:776
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Modifies data under HKEY_USERS
PID:960
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b40cea21cbc92b241c21620b7cb2fb3c
SHA12f7c58b2ee43ca88a556983c8f9cbfb83e39c29c
SHA2566f8871dd101046beaf3568e8737ad6cf3e1c39ccff8fd3c7bf14fd65d4cd8113
SHA51262d229a9c583abe38e2a06a4d177c24ebfdc26bb3531e85b475699fd61c42bc95415d1e7ebc62945c0f00c4ec79df8ac8609065f840f6dacc3f93ff9f2cfbdb0
-
MD5
b40cea21cbc92b241c21620b7cb2fb3c
SHA12f7c58b2ee43ca88a556983c8f9cbfb83e39c29c
SHA2566f8871dd101046beaf3568e8737ad6cf3e1c39ccff8fd3c7bf14fd65d4cd8113
SHA51262d229a9c583abe38e2a06a4d177c24ebfdc26bb3531e85b475699fd61c42bc95415d1e7ebc62945c0f00c4ec79df8ac8609065f840f6dacc3f93ff9f2cfbdb0