Analysis
-
max time kernel
163s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
12-02-2022 03:20
Static task
static1
Behavioral task
behavioral1
Sample
17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe
Resource
win10v2004-en-20220112
General
-
Target
17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe
-
Size
150KB
-
MD5
f7513a15cbb46ea29462a854481c6b2a
-
SHA1
288f0e97e6af5da30a2a3fcac5bbebe251831eea
-
SHA256
17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78
-
SHA512
b0f1855a016dab5cc542ada568a98cee3b258aa7d76b7693034429cbc5228821e43820804e1be580781c55cb3ed1907d06c4e2ec448c2b6793886c2efdef0fb8
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
-
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1472 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe -
Drops file in Windows directory 3 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 49 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132892861168854569" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "2.604269" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4360" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "7.894535" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4100" svchost.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exeTiWorker.exedescription pid process Token: SeIncBasePriorityPrivilege 3728 17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe Token: SeBackupPrivilege 2012 TiWorker.exe Token: SeRestorePrivilege 2012 TiWorker.exe Token: SeSecurityPrivilege 2012 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.execmd.exedescription pid process target process PID 3728 wrote to memory of 1472 3728 17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe MediaCenter.exe PID 3728 wrote to memory of 1472 3728 17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe MediaCenter.exe PID 3728 wrote to memory of 1472 3728 17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe MediaCenter.exe PID 3728 wrote to memory of 484 3728 17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe cmd.exe PID 3728 wrote to memory of 484 3728 17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe cmd.exe PID 3728 wrote to memory of 484 3728 17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe cmd.exe PID 484 wrote to memory of 2132 484 cmd.exe PING.EXE PID 484 wrote to memory of 2132 484 cmd.exe PING.EXE PID 484 wrote to memory of 2132 484 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe"C:\Users\Admin\AppData\Local\Temp\17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2132
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:1016
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3588
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c7073aa4aa881a7a031199f5fa436071
SHA140005cac05d9d3d628df781ade05050f1f46d14e
SHA2560394897f0469f5155fc6998565844d3a56c5e4716279971b3dd3393e8e3d64fb
SHA5121d526e37a3bba5b8c3e968256c64f9d37f3781ee63280ce4a8dd38ec0407922b74053aa403756fb2d9a69c97da013380ae0df1e7480f8bb3a128210389fa0c10
-
MD5
c7073aa4aa881a7a031199f5fa436071
SHA140005cac05d9d3d628df781ade05050f1f46d14e
SHA2560394897f0469f5155fc6998565844d3a56c5e4716279971b3dd3393e8e3d64fb
SHA5121d526e37a3bba5b8c3e968256c64f9d37f3781ee63280ce4a8dd38ec0407922b74053aa403756fb2d9a69c97da013380ae0df1e7480f8bb3a128210389fa0c10