Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 03:06

General

  • Target

    189717612978f8c0e44544f3d165e1fa8e33d3a5e7a0f96cefe87d367dfbd128.exe

  • Size

    60KB

  • MD5

    503ab5655820a272f99136a605899c43

  • SHA1

    93bb8e4de8c553b9cfacb8f225e0cbdcc9758aba

  • SHA256

    189717612978f8c0e44544f3d165e1fa8e33d3a5e7a0f96cefe87d367dfbd128

  • SHA512

    073b624d9c8232d428bde0b61b9d9a85f28c80acfdda539df540e9fd2ead645e09eb656b1868961dded4cc443e2608f92a428d4892fe2027821b985395922b41

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\189717612978f8c0e44544f3d165e1fa8e33d3a5e7a0f96cefe87d367dfbd128.exe
    "C:\Users\Admin\AppData\Local\Temp\189717612978f8c0e44544f3d165e1fa8e33d3a5e7a0f96cefe87d367dfbd128.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:4244
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\189717612978f8c0e44544f3d165e1fa8e33d3a5e7a0f96cefe87d367dfbd128.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4796
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4512
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2052
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    1a4b14e4ff7c0a6d8260d5fdb422109a

    SHA1

    34bbd954fc9ff7c6c9cc4d2bd7b1b00373dde82e

    SHA256

    05f61b41c9e019c00f9e67e16f6b1c239c53f03624675e66d0782702ec2a112e

    SHA512

    14e352bd1c4c9e87ca66020a4886a5820a64011a48c49804d5fea7475a9321785271c8fa7c76e21f4272aff47aa8508186a65e600af4b1a6588906b4110ce1e9

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    1a4b14e4ff7c0a6d8260d5fdb422109a

    SHA1

    34bbd954fc9ff7c6c9cc4d2bd7b1b00373dde82e

    SHA256

    05f61b41c9e019c00f9e67e16f6b1c239c53f03624675e66d0782702ec2a112e

    SHA512

    14e352bd1c4c9e87ca66020a4886a5820a64011a48c49804d5fea7475a9321785271c8fa7c76e21f4272aff47aa8508186a65e600af4b1a6588906b4110ce1e9

  • memory/2052-132-0x000001B358320000-0x000001B358330000-memory.dmp

    Filesize

    64KB

  • memory/2052-133-0x000001B358380000-0x000001B358390000-memory.dmp

    Filesize

    64KB

  • memory/2052-134-0x000001B35AA30000-0x000001B35AA34000-memory.dmp

    Filesize

    16KB