Analysis

  • max time kernel
    141s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 03:22

General

  • Target

    17caf649a5d55892ea756e991881bddc22620b467a930ce4412f7ee5fbb01c2e.exe

  • Size

    191KB

  • MD5

    9fe69e61962d1b68a94cafa9867667e3

  • SHA1

    d16ed25a09112edbe73b708889aa60f8fa315ee7

  • SHA256

    17caf649a5d55892ea756e991881bddc22620b467a930ce4412f7ee5fbb01c2e

  • SHA512

    00b4d223836906a4a960940ef6e16a922115cd5b7033c177c050c34aa6cd9c703d9ca6c7dfd578e596dfe1fde43819f6a3c7f27551c0b0d020cb7d2fe8f6e308

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17caf649a5d55892ea756e991881bddc22620b467a930ce4412f7ee5fbb01c2e.exe
    "C:\Users\Admin\AppData\Local\Temp\17caf649a5d55892ea756e991881bddc22620b467a930ce4412f7ee5fbb01c2e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1388
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\17caf649a5d55892ea756e991881bddc22620b467a930ce4412f7ee5fbb01c2e.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    353e99fc6ff3d1e64cd314f7b0a05385

    SHA1

    d3daee6269cfd7aec5b90ae510f015f5c01aa82f

    SHA256

    80c767d83bf566d995abf186f09bddd099e9c21274046fb53c34cb85c9d91894

    SHA512

    ff1c4a4c9e3d80bb060534bba4a00fdb4e9acccdd9a3e9616d28b9b74cba95ddadd86166b9e917ea87fe99ed706277d7ce333a03bd9421a4df8c7071ff8e63bf

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    353e99fc6ff3d1e64cd314f7b0a05385

    SHA1

    d3daee6269cfd7aec5b90ae510f015f5c01aa82f

    SHA256

    80c767d83bf566d995abf186f09bddd099e9c21274046fb53c34cb85c9d91894

    SHA512

    ff1c4a4c9e3d80bb060534bba4a00fdb4e9acccdd9a3e9616d28b9b74cba95ddadd86166b9e917ea87fe99ed706277d7ce333a03bd9421a4df8c7071ff8e63bf

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    353e99fc6ff3d1e64cd314f7b0a05385

    SHA1

    d3daee6269cfd7aec5b90ae510f015f5c01aa82f

    SHA256

    80c767d83bf566d995abf186f09bddd099e9c21274046fb53c34cb85c9d91894

    SHA512

    ff1c4a4c9e3d80bb060534bba4a00fdb4e9acccdd9a3e9616d28b9b74cba95ddadd86166b9e917ea87fe99ed706277d7ce333a03bd9421a4df8c7071ff8e63bf

  • memory/1680-54-0x0000000076421000-0x0000000076423000-memory.dmp

    Filesize

    8KB