Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 04:32

General

  • Target

    153b2f11b01b9c243690f9358829e3a837e848c9e6da608bd5d657e8622d9c58.exe

  • Size

    58KB

  • MD5

    92c2277ae52caea1ef5a8502b7b98484

  • SHA1

    db8334d3052b61929cdd77a47a4bb71618c1c9f0

  • SHA256

    153b2f11b01b9c243690f9358829e3a837e848c9e6da608bd5d657e8622d9c58

  • SHA512

    29e0c59c469adde1a9345acfc9e52d0bfbd27f8e7bd8497a89a6cfdd46f3a19f83137df396b70a93a23b93e827a7c10a3b95e348e07093576d32319c02a6f95f

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\153b2f11b01b9c243690f9358829e3a837e848c9e6da608bd5d657e8622d9c58.exe
    "C:\Users\Admin\AppData\Local\Temp\153b2f11b01b9c243690f9358829e3a837e848c9e6da608bd5d657e8622d9c58.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1412
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\153b2f11b01b9c243690f9358829e3a837e848c9e6da608bd5d657e8622d9c58.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:684
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    90669d45f658a747bcfe291c0b369e67

    SHA1

    84344e5e53b34062766a82086e8a25923f985fa7

    SHA256

    bed5e8d20c8ba4639c25cd38eeef6614492df57890bc70da04e083d2146ae216

    SHA512

    41b22a4c9944a2bb71a622985532d8b9689ff6452b589f10f641ba2128e7257ae121497b940e5d6b1ccff7218660e0bf1adfb2f6f311206f05415287963ecc72

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    90669d45f658a747bcfe291c0b369e67

    SHA1

    84344e5e53b34062766a82086e8a25923f985fa7

    SHA256

    bed5e8d20c8ba4639c25cd38eeef6614492df57890bc70da04e083d2146ae216

    SHA512

    41b22a4c9944a2bb71a622985532d8b9689ff6452b589f10f641ba2128e7257ae121497b940e5d6b1ccff7218660e0bf1adfb2f6f311206f05415287963ecc72

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    90669d45f658a747bcfe291c0b369e67

    SHA1

    84344e5e53b34062766a82086e8a25923f985fa7

    SHA256

    bed5e8d20c8ba4639c25cd38eeef6614492df57890bc70da04e083d2146ae216

    SHA512

    41b22a4c9944a2bb71a622985532d8b9689ff6452b589f10f641ba2128e7257ae121497b940e5d6b1ccff7218660e0bf1adfb2f6f311206f05415287963ecc72

  • memory/620-54-0x0000000076071000-0x0000000076073000-memory.dmp

    Filesize

    8KB