Analysis

  • max time kernel
    142s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 03:04

General

  • Target

    18ae5071dfd38688d7fa230c6757ae0e6a503f44d99b5f20dd6c7c553915e335.exe

  • Size

    192KB

  • MD5

    b5b2c4d0ac62bec199cb28bd261040a2

  • SHA1

    a2d40d1ce439828bd6086a1938b475b0deef16d7

  • SHA256

    18ae5071dfd38688d7fa230c6757ae0e6a503f44d99b5f20dd6c7c553915e335

  • SHA512

    763133812230ba19d27a2cd92538117ff57a1c714184e868798dc5f7c67013163f1d2a9735ade755829e5e7baa7d4099a0f0cc801508081d8ef4f334cf5fa8eb

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 49 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18ae5071dfd38688d7fa230c6757ae0e6a503f44d99b5f20dd6c7c553915e335.exe
    "C:\Users\Admin\AppData\Local\Temp\18ae5071dfd38688d7fa230c6757ae0e6a503f44d99b5f20dd6c7c553915e335.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:2816
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\18ae5071dfd38688d7fa230c6757ae0e6a503f44d99b5f20dd6c7c553915e335.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3580
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:2884
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:1916
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    847c2f0df0c94ce2976cba0315a7eeda

    SHA1

    ac4d80544a2cc53099e0d23557772de96b4ac9f5

    SHA256

    0620916fb8904a91279fbfd1d4c0685f85191b6fff7c9f54108509e40046f301

    SHA512

    e32cfbd446ca1fa9dfc2bc7b09d36c9441a2a0d7b3dc5b47bef7fd455b1893d12693ef11e790cb9d79a0d2aee79ce7ac1822297b279439ed84ac3eef4a4e6c1f

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    847c2f0df0c94ce2976cba0315a7eeda

    SHA1

    ac4d80544a2cc53099e0d23557772de96b4ac9f5

    SHA256

    0620916fb8904a91279fbfd1d4c0685f85191b6fff7c9f54108509e40046f301

    SHA512

    e32cfbd446ca1fa9dfc2bc7b09d36c9441a2a0d7b3dc5b47bef7fd455b1893d12693ef11e790cb9d79a0d2aee79ce7ac1822297b279439ed84ac3eef4a4e6c1f