Analysis

  • max time kernel
    139s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 04:35

General

  • Target

    151b665e56457510f53f992f62b2c27acb48d45968ebd64dad051d6d0490d5fe.exe

  • Size

    35KB

  • MD5

    29bf8ce849aba6c2f3d7a7d7e6b4be49

  • SHA1

    030fbf49e6fc42313cff586c8fa73780f66b23da

  • SHA256

    151b665e56457510f53f992f62b2c27acb48d45968ebd64dad051d6d0490d5fe

  • SHA512

    608ad9b78aa7f031bd894d9e727f8e3ffc6427d3ac7ce5bda70fa656cb198b82952bffab8a2122b542605b4c535a66ae3f8606205b9cf1d3ff37f758da38d5a6

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\151b665e56457510f53f992f62b2c27acb48d45968ebd64dad051d6d0490d5fe.exe
    "C:\Users\Admin\AppData\Local\Temp\151b665e56457510f53f992f62b2c27acb48d45968ebd64dad051d6d0490d5fe.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1492
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\151b665e56457510f53f992f62b2c27acb48d45968ebd64dad051d6d0490d5fe.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1096

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    b1845ec5efcd040e30010f1a3db89f8e

    SHA1

    42b5d22748d0164aea987da8b4109dc6db5f70ee

    SHA256

    76eacd9fb1bb86b19a1879aeb47834e79fe558d465d0cbb88649cd8433910b7b

    SHA512

    550d43801e6090f31d4d17b92d1863c428b12abb0f4d9e2d2452813ea4aec98af70608432c0dda100d997685d58ae8070eb8606678b6dc4d6ed3cf39f40fe7d0

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    b1845ec5efcd040e30010f1a3db89f8e

    SHA1

    42b5d22748d0164aea987da8b4109dc6db5f70ee

    SHA256

    76eacd9fb1bb86b19a1879aeb47834e79fe558d465d0cbb88649cd8433910b7b

    SHA512

    550d43801e6090f31d4d17b92d1863c428b12abb0f4d9e2d2452813ea4aec98af70608432c0dda100d997685d58ae8070eb8606678b6dc4d6ed3cf39f40fe7d0

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    b1845ec5efcd040e30010f1a3db89f8e

    SHA1

    42b5d22748d0164aea987da8b4109dc6db5f70ee

    SHA256

    76eacd9fb1bb86b19a1879aeb47834e79fe558d465d0cbb88649cd8433910b7b

    SHA512

    550d43801e6090f31d4d17b92d1863c428b12abb0f4d9e2d2452813ea4aec98af70608432c0dda100d997685d58ae8070eb8606678b6dc4d6ed3cf39f40fe7d0

  • memory/1412-55-0x0000000076851000-0x0000000076853000-memory.dmp

    Filesize

    8KB