Analysis

  • max time kernel
    157s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 04:36

General

  • Target

    1507909ca7da1a2a47fa228ab78bf5dcfe67efbf59d1c03ba63652ab0e67eb84.exe

  • Size

    60KB

  • MD5

    aac634c0fe4a1f400cfcb23eea2aa603

  • SHA1

    b7239a71dcbc7f4bf7390723a972738a17c303d1

  • SHA256

    1507909ca7da1a2a47fa228ab78bf5dcfe67efbf59d1c03ba63652ab0e67eb84

  • SHA512

    9c0a63d426deb37bb793115a5de84a862ce7d778c7b17eb6bc7bd95fbb90737588f42ca992c57452c1aafe64cac25c6469feb6b9497e411d64cdbb5e0a80ad60

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 49 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1507909ca7da1a2a47fa228ab78bf5dcfe67efbf59d1c03ba63652ab0e67eb84.exe
    "C:\Users\Admin\AppData\Local\Temp\1507909ca7da1a2a47fa228ab78bf5dcfe67efbf59d1c03ba63652ab0e67eb84.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1020
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\1507909ca7da1a2a47fa228ab78bf5dcfe67efbf59d1c03ba63652ab0e67eb84.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3908
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:364
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:3240
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2864

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    5ef4387468ec3842b9a37d078b6d65b9

    SHA1

    687b84150a97e65637071f4cd8a0836afd17d44e

    SHA256

    f7e8007e6d770723a81b1d6503faa536131f274eac460a11741b0061cdba718b

    SHA512

    13d88bc6ad713d22bc95b54d4b7fb91a1771337cc88bf37730bf7c7a0df3119be46041e05937f84c1a5cf7b156783fa04434503adf2091e65fd2f4c84ed9f63f

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    5ef4387468ec3842b9a37d078b6d65b9

    SHA1

    687b84150a97e65637071f4cd8a0836afd17d44e

    SHA256

    f7e8007e6d770723a81b1d6503faa536131f274eac460a11741b0061cdba718b

    SHA512

    13d88bc6ad713d22bc95b54d4b7fb91a1771337cc88bf37730bf7c7a0df3119be46041e05937f84c1a5cf7b156783fa04434503adf2091e65fd2f4c84ed9f63f