Analysis

  • max time kernel
    120s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 04:36

General

  • Target

    150e54b3e9f7589df60689a67620577b16e8c7532ac02c7912bfb1e3aefa0a9a.exe

  • Size

    36KB

  • MD5

    b9365e30d47a5b2a378298d4a7e3aac6

  • SHA1

    47a0e814c10d305e0c31cb22baab65ab4f507957

  • SHA256

    150e54b3e9f7589df60689a67620577b16e8c7532ac02c7912bfb1e3aefa0a9a

  • SHA512

    afdabcad6addd982f976a43e99802835f906a097b7d54f6e87cea182958ff9abc5b7df4cd5490a5c73880aa13285df3eeb8fe1e7b97478d006249e3f73fcac96

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\150e54b3e9f7589df60689a67620577b16e8c7532ac02c7912bfb1e3aefa0a9a.exe
    "C:\Users\Admin\AppData\Local\Temp\150e54b3e9f7589df60689a67620577b16e8c7532ac02c7912bfb1e3aefa0a9a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1224
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\150e54b3e9f7589df60689a67620577b16e8c7532ac02c7912bfb1e3aefa0a9a.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    4fdce2fc7e4e94804be4fcf482ae5161

    SHA1

    2ff4e31470aa4d9e251068c48c748e72d2dcf2bf

    SHA256

    c1915b0e31c0c782ba1e7f6a9612a2861f86bb48009fb3ee44068313c68e609e

    SHA512

    3d5038b18b4093841f7cf98de9cbf6418b2ffdd6f1c77f46b4437e293d955db667dbd5d2bc2e569517b33b0ac61844a77a3df9d9a3774ca5a040ed3fbfc3d289

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    4fdce2fc7e4e94804be4fcf482ae5161

    SHA1

    2ff4e31470aa4d9e251068c48c748e72d2dcf2bf

    SHA256

    c1915b0e31c0c782ba1e7f6a9612a2861f86bb48009fb3ee44068313c68e609e

    SHA512

    3d5038b18b4093841f7cf98de9cbf6418b2ffdd6f1c77f46b4437e293d955db667dbd5d2bc2e569517b33b0ac61844a77a3df9d9a3774ca5a040ed3fbfc3d289

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    4fdce2fc7e4e94804be4fcf482ae5161

    SHA1

    2ff4e31470aa4d9e251068c48c748e72d2dcf2bf

    SHA256

    c1915b0e31c0c782ba1e7f6a9612a2861f86bb48009fb3ee44068313c68e609e

    SHA512

    3d5038b18b4093841f7cf98de9cbf6418b2ffdd6f1c77f46b4437e293d955db667dbd5d2bc2e569517b33b0ac61844a77a3df9d9a3774ca5a040ed3fbfc3d289

  • memory/1892-54-0x0000000076071000-0x0000000076073000-memory.dmp

    Filesize

    8KB