Analysis

  • max time kernel
    143s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 03:19

General

  • Target

    17f685852cc584d950834ce09b56cac5293856f19ddf55ae958a383b9588df43.exe

  • Size

    35KB

  • MD5

    2079e6d43e8c8196de30931891230d2e

  • SHA1

    b27f6fed23701d4d06e49839602a1e962561ac2c

  • SHA256

    17f685852cc584d950834ce09b56cac5293856f19ddf55ae958a383b9588df43

  • SHA512

    b0e0b72456eea4f2c2e58c82bd1e8a490a91edd506b8643a889644e668d0599695e81c10babf4efaadf4a1a28d54ad34d2b1c5fbcb32dd9b9f4fcc17c2577075

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17f685852cc584d950834ce09b56cac5293856f19ddf55ae958a383b9588df43.exe
    "C:\Users\Admin\AppData\Local\Temp\17f685852cc584d950834ce09b56cac5293856f19ddf55ae958a383b9588df43.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:408
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\17f685852cc584d950834ce09b56cac5293856f19ddf55ae958a383b9588df43.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1588
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3484
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4936
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:628

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    e525a12a03d7febf2a635c8ba0dea1d8

    SHA1

    fefc9b3fbc304fcea2eace8a12a06a8d9cb162a5

    SHA256

    f167f3386917505081097613ce6d241335cafac185cf9a1c7f9b0763a3c309ec

    SHA512

    078560ac3728fab21c33e336c970715b4ade4f499eca33609d9b1d508b529d44e156f90b67b06406d2ac610da8180117723168e3959445d6c46c47de1f8ae015

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    e525a12a03d7febf2a635c8ba0dea1d8

    SHA1

    fefc9b3fbc304fcea2eace8a12a06a8d9cb162a5

    SHA256

    f167f3386917505081097613ce6d241335cafac185cf9a1c7f9b0763a3c309ec

    SHA512

    078560ac3728fab21c33e336c970715b4ade4f499eca33609d9b1d508b529d44e156f90b67b06406d2ac610da8180117723168e3959445d6c46c47de1f8ae015

  • memory/4936-132-0x000002444F760000-0x000002444F770000-memory.dmp

    Filesize

    64KB

  • memory/4936-133-0x000002444FD20000-0x000002444FD30000-memory.dmp

    Filesize

    64KB

  • memory/4936-134-0x0000024452390000-0x0000024452394000-memory.dmp

    Filesize

    16KB