Analysis
-
max time kernel
176s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
12-02-2022 03:06
Static task
static1
Behavioral task
behavioral1
Sample
1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe
Resource
win10v2004-en-20220112
General
-
Target
1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe
-
Size
150KB
-
MD5
3c30a0951fb24a5c3166fbcb35dafcca
-
SHA1
fba602abb1f9018a9a2ab1ac60e3b85a8a19fce6
-
SHA256
1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187
-
SHA512
9e78656a613fb3a244c02142bca9801b81be8ac52cb780730d7750b5114b15ccf1b909dbb8e5bf185a1ffd8ae0c793edc96fcfb5930d09734b258e765dc1dc27
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1736 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe -
Drops file in Windows directory 3 IoCs
Processes:
TiWorker.exesvchost.exedescription ioc process File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 47 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.227792" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4284" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4096" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "1.923016" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132892853544284257" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exeTiWorker.exedescription pid process Token: SeIncBasePriorityPrivilege 3936 1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe Token: SeBackupPrivilege 2708 TiWorker.exe Token: SeRestorePrivilege 2708 TiWorker.exe Token: SeSecurityPrivilege 2708 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.execmd.exedescription pid process target process PID 3936 wrote to memory of 1736 3936 1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe MediaCenter.exe PID 3936 wrote to memory of 1736 3936 1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe MediaCenter.exe PID 3936 wrote to memory of 1736 3936 1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe MediaCenter.exe PID 3936 wrote to memory of 2956 3936 1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe cmd.exe PID 3936 wrote to memory of 2956 3936 1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe cmd.exe PID 3936 wrote to memory of 2956 3936 1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe cmd.exe PID 2956 wrote to memory of 1640 2956 cmd.exe PING.EXE PID 2956 wrote to memory of 1640 2956 cmd.exe PING.EXE PID 2956 wrote to memory of 1640 2956 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe"C:\Users\Admin\AppData\Local\Temp\1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\1891ca6eb7e7e9aabab817b7e83eb82c400836952b2ad0f58a3ac2ff24da6187.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1640
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:1244
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:824
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
2d5565f0fcab4cb8c3b84bacfc0a0524
SHA1e910bad58a3e6cfd5ecfbf43619d6f3db3b51066
SHA2562b712d38cae1d1d2461e6071b3a6e5c03e17f2bc7d50efe513899173efd4be76
SHA5120a7afd63f70ecc6c52d5509a62442d9348fe47cbc39c4cc34d8fdd5f9014768683150da238c725c67fb192f25343ad185fd68591d37dc13f920106700cd38b6c
-
MD5
2d5565f0fcab4cb8c3b84bacfc0a0524
SHA1e910bad58a3e6cfd5ecfbf43619d6f3db3b51066
SHA2562b712d38cae1d1d2461e6071b3a6e5c03e17f2bc7d50efe513899173efd4be76
SHA5120a7afd63f70ecc6c52d5509a62442d9348fe47cbc39c4cc34d8fdd5f9014768683150da238c725c67fb192f25343ad185fd68591d37dc13f920106700cd38b6c