Analysis

  • max time kernel
    147s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 04:33

General

  • Target

    15315ad1a1c64f20851edc4d18f7d3003e64b5fba4d53d23453af9f58b54ff71.exe

  • Size

    92KB

  • MD5

    457768975bbbc2ef2034824dde96a009

  • SHA1

    0a0e85f9231480c47f23bbc469d94176fdeed67d

  • SHA256

    15315ad1a1c64f20851edc4d18f7d3003e64b5fba4d53d23453af9f58b54ff71

  • SHA512

    afc93c82a8b366272a49b734a488c00c1f8edd789cd64b348e2b44df9301afd54379f220cbde4790a1ef56491d781bccad4d54dea0d785b11c414b689fa4f7ce

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15315ad1a1c64f20851edc4d18f7d3003e64b5fba4d53d23453af9f58b54ff71.exe
    "C:\Users\Admin\AppData\Local\Temp\15315ad1a1c64f20851edc4d18f7d3003e64b5fba4d53d23453af9f58b54ff71.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1544
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\15315ad1a1c64f20851edc4d18f7d3003e64b5fba4d53d23453af9f58b54ff71.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4304
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:5080
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1224
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    bf6a843e9af6af00578e50dd0c858fd2

    SHA1

    4bf0b669afb03a7c9eeffe83c9fdacef5f550b60

    SHA256

    00765173448a7b9ddbf10a61b7b17130867e8897c21ad2972271e60169f5e586

    SHA512

    4ab32c1cd2231262c369e137b123359efa4b2beb6ff7aca07b2afffe3fe6a39f7b826e332c6d97524f7b173abbab260483a161cd5ec012d2a47b70a12d5f7eaa

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    bf6a843e9af6af00578e50dd0c858fd2

    SHA1

    4bf0b669afb03a7c9eeffe83c9fdacef5f550b60

    SHA256

    00765173448a7b9ddbf10a61b7b17130867e8897c21ad2972271e60169f5e586

    SHA512

    4ab32c1cd2231262c369e137b123359efa4b2beb6ff7aca07b2afffe3fe6a39f7b826e332c6d97524f7b173abbab260483a161cd5ec012d2a47b70a12d5f7eaa

  • memory/1224-132-0x0000017009360000-0x0000017009370000-memory.dmp

    Filesize

    64KB

  • memory/1224-133-0x0000017009AE0000-0x0000017009AF0000-memory.dmp

    Filesize

    64KB

  • memory/1224-134-0x000001700BFB0000-0x000001700BFB4000-memory.dmp

    Filesize

    16KB